anviz CVE Vulnerabilities & Metrics

Focus on anviz vulnerabilities and metrics.

Last updated: 12 May 2026, 22:25 UTC

About anviz Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with anviz. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total anviz CVEs: 21
Earliest CVE date: 06 Jun 2019, 20:29 UTC
Latest CVE date: 17 Apr 2026, 20:16 UTC

Latest CVE reference: CVE-2026-40461

Rolling Stats

30-day Count (Rolling): 12
365-day Count (Rolling): 12

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical anviz CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.74

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 12
4.0-6.9 5
7.0-8.9 3
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS anviz CVEs

These are the five CVEs with the highest CVSS scores for anviz, sorted by severity first and recency.

All CVEs for anviz

CVE-2026-40461 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CX2 Lite and CX7 are vulnerable to unauthenticated POST requests that modify debug settings (e.g., enabling SSH), allowing unauthorized state changes that can facilitate later compromise.

CVE-2026-40434 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CrossChex Standard lacks source verification in the client/server channel, enabling TCP packet injection by an attacker on the same network to alter or disrupt application traffic.

CVE-2026-40066 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CX2 Lite and CX7 are vulnerable to unverified update packages that can be uploaded. The device unpacks and executes a script resulting in unauthenticated remote code execution.

CVE-2026-35682 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CX2 Lite is vulnerable to an authenticated command injection via a filename parameter that enables arbitrary command execution (e.g., starting telnetd), resulting in root‑level access.

CVE-2026-35546 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This causes crafted archives to be accepted, enabling attackers to plant and execute code and obtain a reverse shell.

CVE-2026-35061 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CX7 Firmware is vulnerable to the most recently captured test photo that can be retrieved without authentication, revealing sensitive operational imagery.

CVE-2026-33569 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CX2 Lite and CX7 administrative sessions occur over HTTP, enabling on‑path attackers to sniff credentials and session data, which can be used to compromise the device.

CVE-2026-33093 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CX7 Firmware is vulnerable to an unauthenticated POST to the device that captures a photo with the front facing camera, exposing visual information about the deployment environment.

CVE-2026-32650 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable encryption, causing database credentials to be sent in plaintext and enabling unauthorized database access.

CVE-2026-32648 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CX2 Lite and CX7 are vulnerable to unauthenticated access that discloses debug configuration details (e.g., SSH/RTTY status), assisting attackers in reconnaissance against the device.

CVE-2026-32324 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CX7 Firmware is  vulnerable because the application embeds reusable certificate/key material, enabling decryption of MQTT traffic and potential interaction with device messaging channels at scale.

CVE-2026-31927 anviz vulnerability CVSS: 0 17 Apr 2026, 20:16 UTC

Anviz CX7 Firmware is vulnerable to an authenticated CSV upload which allows path traversal to overwrite arbitrary files (e.g., /etc/shadow), enabling unauthorized SSH access when combined with debug‑setting changes

CVE-2019-12518 anviz vulnerability CVSS: 10.0 02 Dec 2019, 17:15 UTC

Anviz CrossChex access control management software 4.3.8.0 and 4.3.12 is vulnerable to a buffer overflow vulnerability.

CVE-2019-12394 anviz vulnerability CVSS: 7.5 02 Dec 2019, 17:15 UTC

Anviz access control devices allow unverified password change which allows remote attackers to change the administrator password without prior authentication.

CVE-2019-12393 anviz vulnerability CVSS: 5.0 02 Dec 2019, 17:15 UTC

Anviz access control devices are vulnerable to replay attacks which could allow attackers to intercept and replay open door requests.

CVE-2019-12392 anviz vulnerability CVSS: 7.5 02 Dec 2019, 17:15 UTC

Anviz access control devices allow remote attackers to issue commands without a password.

CVE-2019-12391 anviz vulnerability CVSS: 5.0 02 Dec 2019, 17:15 UTC

The Anviz Management System for access control has insufficient logging for device events such as door open requests.

CVE-2019-12390 anviz vulnerability CVSS: 5.0 02 Dec 2019, 17:15 UTC

Anviz access control devices expose private Information (pin code and name) by allowing remote attackers to query this information without credentials via port tcp/5010.

CVE-2019-12389 anviz vulnerability CVSS: 5.0 02 Dec 2019, 17:15 UTC

Anviz access control devices expose credentials (names and passwords) by allowing remote attackers to query this information without credentials via port tcp/5010.

CVE-2019-12388 anviz vulnerability CVSS: 5.0 02 Dec 2019, 17:15 UTC

Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010.

CVE-2019-11523 anviz vulnerability CVSS: 7.5 06 Jun 2019, 20:29 UTC

Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).