Description
An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.
Published: 2022-11-21
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The cloud service used by appWash was fixed on 05.10.2022.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-42953 An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.
History

Fri, 25 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-04-25T19:29:31.066Z

Reserved: 2022-10-18T13:47:24.107Z

Link: CVE-2022-3589

cve-icon Vulnrichment

Updated: 2024-08-03T01:14:01.961Z

cve-icon NVD

Status : Modified

Published: 2022-11-21T10:15:31.437

Modified: 2024-11-21T07:19:49.797

Link: CVE-2022-3589

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses