Description
The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which leak a deviceId.
Published: 2023-04-04
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-23972 The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which leak a deviceId.
History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Getnexx Nxal-100 Nxal-100 Firmware Nxg-100b Nxg-100b Firmware Nxg-200 Nxg-200 Firmware Nxpg-100w Nxpg-100w Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:36:44.458Z

Reserved: 2023-03-30T20:04:29.870Z

Link: CVE-2023-1751

cve-icon Vulnrichment

Updated: 2024-08-02T05:57:25.083Z

cve-icon NVD

Status : Modified

Published: 2023-04-04T17:15:07.227

Modified: 2024-11-21T07:39:49.713

Link: CVE-2023-1751

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses