Impact
A flaw in Azure IoT Explorer allows an attacker to bind the application to an unrestricted IP address, enabling the discovery of internal configuration or status information. The vulnerability stems from improper handling of network settings, which is consistent with the weaknesses identified in CWE-1327 and CWE-668. Because the exposed data can be gathered over the network, the primary impact is the unauthorized disclosure of potentially sensitive information.
Affected Systems
Microsoft Azure IoT Explorer is the product affected. No specific version information is listed in the CVE data, so all current installations are potentially impacted until a fix is applied.
Risk and Exploitability
The CVSS base score is 6.5, indicating a moderate severity. Meanwhile, the EPSS score is under 1%, meaning the probability of exploitation is very low at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote over a network; an attacker who can reach the exposed port can exploit the binding flaw to learn information.
OpenCVE Enrichment