An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.
Fixes

Solution

The cloud service used by appWash was fixed on 05.10.2022.


Workaround

No workaround given by the vendor.

History

Fri, 25 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-04-25T19:29:31.066Z

Reserved: 2022-10-18T13:47:24.107Z

Link: CVE-2022-3589

cve-icon Vulnrichment

Updated: 2024-08-03T01:14:01.961Z

cve-icon NVD

Status : Modified

Published: 2022-11-21T10:15:31.437

Modified: 2024-11-21T07:19:49.797

Link: CVE-2022-3589

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.