TCP Packet Injection Vulnerability in Anviz CrossChex Standard
CVE-2026-40434

8.1HIGH

Key Information:

Vendor

Anviz

Vendor
CVE Published:
17 April 2026

What is CVE-2026-40434?

The Anviz CrossChex Standard application suffers from a significant security flaw due to a lack of source verification in the client/server communication channel. This vulnerability allows malicious actors on the same network to launch TCP packet injection attacks, potentially altering or disrupting application traffic. Without appropriate safeguards in place, sensitive data may be at risk, highlighting the need for prompt security assessments and mitigations.

Affected Version(s)

Anviz CrossChex Standard All versions

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.