An issue was discovered on certain Nuki Home Solutions devices. The HTTP API exposed by a Bridge used an unencrypted channel to provide an administrative interface. A token can be easily eavesdropped by a malicious actor to impersonate a legitimate user and gain access to the full set of API endpoints. This affects Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-319 | |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-07T16:08:56.329Z
Reserved:
Link: CVE-2022-32510
Vulnrichment
Updated: 2024-08-03T07:46:43.408Z
NVD
Status : Awaiting Analysis
Published: 2024-05-14T10:43:42.323
Modified: 2024-11-07T16:35:05.843
Link: CVE-2022-32510
Redhat
No data.