2024-07-14 02:06:08 +00:00

41 lines
1.6 KiB
JSON

{
"id": "CVE-2024-0390",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-02-15T10:15:09.043",
"lastModified": "2024-02-15T14:28:31.380",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "INPRAX \"iZZi connect\" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit \"reQnet iZZi\".This issue affects \"iZZi connect\" application versions before 2024010401.\n\n"
},
{
"lang": "es",
"value": "La aplicaci\u00f3n INPRAX \"iZZi connect\" en Android contiene credenciales de cola MQTT codificadas. Los dispositivos de recuperaci\u00f3n f\u00edsica correspondientes utilizan la misma cola MQTT. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda permitir el acceso no autorizado para administrar y leer los par\u00e1metros de la unidad de recuperaci\u00f3n \"reQnet iZZi\". Este problema afecta a las versiones de la aplicaci\u00f3n \"iZZi connect\" anteriores a 2024010401."
}
],
"metrics": {},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/02/CVE-2024-0390/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/02/CVE-2024-0390/",
"source": "cvd@cert.pl"
}
]
}