Security Advisory

CVE-2026-1495

CVE vulnerability detail — eXtreme Datacenter Security Operations

Published 2026-02-10 20:18:10
Last updated 2026-02-12 18:46:41
Assigner icscert
State PUBLISHED

Description

The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.