The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which leak a deviceId.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01 | Third Party Advisory US Government Resource |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 07:39
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01 - Third Party Advisory, US Government Resource |
Information
Published : 2023-04-04 17:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1751
Mitre link : CVE-2023-1751
CVE.ORG link : CVE-2023-1751
JSON object : View
Products Affected
getnexx
- nxg-200
- nxg-200_firmware
- nxal-100_firmware
- nxpg-100w_firmware
- nxg-100b_firmware
- nxpg-100w
- nxg-100b
- nxal-100
CWE