Anviz CrossChex Standard
lacks source verification in the client/server channel, enabling TCP
packet injection by an attacker on the same network to alter or disrupt
application traffic.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Anviz did not respond to CISA's attempts to coordinate these vulnerabilities. Users should contact Anviz for more information at https://www.anviz.com/contact-us.html.

History

Fri, 17 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description Anviz CrossChex Standard lacks source verification in the client/server channel, enabling TCP packet injection by an attacker on the same network to alter or disrupt application traffic.
Title Anviz CrossChex Standard Improper Verification of Source of a Communication Channel
Weaknesses CWE-940
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-17T20:28:02.785Z

Reserved: 2026-04-14T15:42:14.096Z

Link: CVE-2026-40434

cve-icon Vulnrichment

Updated: 2026-04-17T20:27:29.011Z

cve-icon NVD

Status : Received

Published: 2026-04-17T20:16:36.083

Modified: 2026-04-17T20:16:36.083

Link: CVE-2026-40434

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses