The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.
References
Configurations
No configuration.
History
10 Feb 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-10 21:16
Updated : 2026-02-10 21:51
NVD link : CVE-2026-1495
Mitre link : CVE-2026-1495
CVE.ORG link : CVE-2026-1495
JSON object : View
Products Affected
No product.
CWE
CWE-532
Insertion of Sensitive Information into Log File
