Security Advisory
CVE-2026-1495
CVE vulnerability detail — eXtreme Datacenter Security Operations
Description
The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.