Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16186 | INPRAX "iZZi connect" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit "reQnet iZZi".This issue affects "iZZi connect" application versions before 2024010401. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 13 Mar 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 23 Jan 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Inprax
Inprax izzi Connect |
|
| CPEs | cpe:2.3:a:inprax:izzi_connect:*:*:*:*:*:android:*:* | |
| Vendors & Products |
Inprax
Inprax izzi Connect |
|
| Metrics |
cvssV3_1
|
Thu, 07 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-03-13T17:58:39.772Z
Reserved: 2024-01-10T08:24:47.234Z
Link: CVE-2024-0390
Updated: 2024-08-01T18:04:49.430Z
Status : Modified
Published: 2024-02-15T10:15:09.043
Modified: 2025-03-13T18:15:36.243
Link: CVE-2024-0390
No data.
OpenCVE Enrichment
No data.
EUVD