Description
The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication.
This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device
This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-50121 | The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication. This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device |
References
History
No history.
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2024-09-11T18:06:40.524Z
Reserved: 2023-10-18T09:35:22.524Z
Link: CVE-2023-45851
Updated: 2024-08-02T20:29:32.293Z
Status : Modified
Published: 2023-10-25T18:17:35.427
Modified: 2024-11-21T08:27:28.970
Link: CVE-2023-45851
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD