Description
Anviz CrossChex Standard
lacks source verification in the client/server channel, enabling TCP
packet injection by an attacker on the same network to alter or disrupt
application traffic.
Published: 2026-04-17
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential manipulation or disruption of application traffic via injected TCP packets
Action: Contact Vendor
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Workaround

Anviz did not respond to CISA's attempts to coordinate these vulnerabilities. Users should contact Anviz for more information at https://www.anviz.com/contact-us.html.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Anviz crosschex Standard
CPEs cpe:2.3:a:anviz:crosschex_standard:-:*:*:*:*:*:*:*
Vendors & Products Anviz crosschex Standard

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Anviz
Anviz anviz Crosschex Standard
Vendors & Products Anviz
Anviz anviz Crosschex Standard

Fri, 17 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description Anviz CrossChex Standard lacks source verification in the client/server channel, enabling TCP packet injection by an attacker on the same network to alter or disrupt application traffic.
Title Anviz CrossChex Standard Improper Verification of Source of a Communication Channel
Weaknesses CWE-940
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Anviz Anviz Crosschex Standard Crosschex Standard
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-17T20:28:02.785Z

Reserved: 2026-04-14T15:42:14.096Z

Link: CVE-2026-40434

cve-icon Vulnrichment

Updated: 2026-04-17T20:27:29.011Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-17T20:16:36.083

Modified: 2026-05-04T14:38:01.077

Link: CVE-2026-40434

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:59:42Z

Weaknesses