An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42953 | An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability. |
Fixes
Solution
The cloud service used by appWash was fixed on 05.10.2022.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://cert.vde.com/de/advisories/VDE-2022-052/ |
|
History
Fri, 25 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-04-25T19:29:31.066Z
Reserved: 2022-10-18T13:47:24.107Z
Link: CVE-2022-3589
Updated: 2024-08-03T01:14:01.961Z
Status : Modified
Published: 2022-11-21T10:15:31.437
Modified: 2024-11-21T07:19:49.797
Link: CVE-2022-3589
No data.
OpenCVE Enrichment
No data.
EUVD