Description
Anviz CX7 Firmware is 
vulnerable because the application embeds reusable certificate/key
material, enabling decryption of MQTT traffic and potential interaction
with device messaging channels at scale.
Published: 2026-04-17
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized device access and traffic decryption
Action: Update Firmware
AI Analysis

Impact

Anviz CX7 Firmware embeds a reusable certificate/key material (CWE‑321), meaning the same cryptographic key is stored in every firmware image. This hard‑coded key enables decryption of MQTT traffic, and the advisory notes the possibility of interacting with device messaging channels at scale; thus confidentiality, integrity, and potentially control of the device are at risk.

Affected Systems

The affected system is the Anviz CX7 device running firmware that contains the reusable key material. No specific firmware version was identified, so any current build that has not yet been patched may be vulnerable until a corrected version is released.

Risk and Exploitability

With a CVSS score of 7.7 the flaw is moderate to high severity. The EPSS score of less than 1% indicates a low but nonzero probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Because the key is embedded in the firmware, an attacker who can locate and extract it — a possibility implied by the hard‑coded nature of the key — could decrypt intercepted MQTT traffic. This inference regarding the ease of key extraction is drawn from the description, not stated explicitly in the advisory.

Generated by OpenCVE AI on April 18, 2026 at 19:26 UTC.

Remediation

Vendor Workaround

Anviz did not respond to CISA's attempts to coordinate these vulnerabilities. Users should contact Anviz for more information at https://www.anviz.com/contact-us.html.


OpenCVE Recommended Actions

  • Apply the latest firmware update from Anviz once it becomes available.
  • If no update is available, contact Anviz directly for guidance as suggested by the vendor.
  • Disable or isolate MQTT traffic, or use a TLS‑protected communication channel if feasible.
  • Deploy network monitoring to detect anomalous MQTT traffic and enforce strict access controls on device management interfaces.

Generated by OpenCVE AI on April 18, 2026 at 19:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Anviz
Anviz anviz Cx7 Firmware
Vendors & Products Anviz
Anviz anviz Cx7 Firmware

Fri, 17 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description Anviz CX7 Firmware is  vulnerable because the application embeds reusable certificate/key material, enabling decryption of MQTT traffic and potential interaction with device messaging channels at scale.
Title Anviz CX7 Firmware Use of Hard-coded Cryptographic Key
Weaknesses CWE-321
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Anviz Anviz Cx7 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-17T20:10:48.189Z

Reserved: 2026-04-14T15:47:54.287Z

Link: CVE-2026-32324

cve-icon Vulnrichment

Updated: 2026-04-17T20:10:41.733Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-17T20:16:33.817

Modified: 2026-04-20T19:05:30.750

Link: CVE-2026-32324

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T15:05:23Z

Weaknesses