The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication.
This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device
This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-50121 | The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication. This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2024-09-11T18:06:40.524Z
Reserved: 2023-10-18T09:35:22.524Z
Link: CVE-2023-45851
Updated: 2024-08-02T20:29:32.293Z
Status : Modified
Published: 2023-10-25T18:17:35.427
Modified: 2024-11-21T08:27:28.970
Link: CVE-2023-45851
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD