Description
The Android Client application, when enrolled with the define method 1 (the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user. Due to the lack of encryption of HTTP,this issue allows an attacker placed in the same subnet network of the HMI device to intercept username and password necessary to authenticate to the MQTT server responsible to implement the remote management protocol.
Published: 2023-10-25
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-49615 The Android Client application, when enrolled with the define method 1 (the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user. Due to the lack of encryption of HTTP,this issue allows an attacker placed in the same subnet network of the HMI device to intercept username and password necessary to authenticate to the MQTT server responsible to implement the remote management protocol.
History

No history.

Subscriptions

Boschrexroth Ctrlx Hmi Web Panel Wr2107 Ctrlx Hmi Web Panel Wr2107 Firmware Ctrlx Hmi Web Panel Wr2110 Ctrlx Hmi Web Panel Wr2110 Firmware Ctrlx Hmi Web Panel Wr2115 Ctrlx Hmi Web Panel Wr2115 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: bosch

Published:

Updated: 2024-09-11T18:11:00.080Z

Reserved: 2023-10-18T09:35:22.518Z

Link: CVE-2023-45321

cve-icon Vulnrichment

Updated: 2024-08-02T20:21:15.404Z

cve-icon NVD

Status : Modified

Published: 2023-10-25T18:17:33.183

Modified: 2024-11-21T08:26:44.633

Link: CVE-2023-45321

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses