CVE-2024-0390

INPRAX "iZZi connect" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit "reQnet iZZi".This issue affects "iZZi connect" application versions before 2024010401.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inprax:izzi_connect:*:*:*:*:*:android:*:*

History

23 Jan 2025, 17:16

Type Values Removed Values Added
First Time Inprax izzi Connect
Inprax
References () https://cert.pl/en/posts/2024/02/CVE-2024-0390/ - () https://cert.pl/en/posts/2024/02/CVE-2024-0390/ - Third Party Advisory
References () https://cert.pl/posts/2024/02/CVE-2024-0390/ - () https://cert.pl/posts/2024/02/CVE-2024-0390/ - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:inprax:izzi_connect:*:*:*:*:*:android:*:*

21 Nov 2024, 08:46

Type Values Removed Values Added
Summary
  • (es) La aplicación INPRAX "iZZi connect" en Android contiene credenciales de cola MQTT codificadas. Los dispositivos de recuperación física correspondientes utilizan la misma cola MQTT. La explotación de esta vulnerabilidad podría permitir el acceso no autorizado para administrar y leer los parámetros de la unidad de recuperación "reQnet iZZi". Este problema afecta a las versiones de la aplicación "iZZi connect" anteriores a 2024010401.
References () https://cert.pl/en/posts/2024/02/CVE-2024-0390/ - () https://cert.pl/en/posts/2024/02/CVE-2024-0390/ -
References () https://cert.pl/posts/2024/02/CVE-2024-0390/ - () https://cert.pl/posts/2024/02/CVE-2024-0390/ -

15 Feb 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-15 10:15

Updated : 2025-03-13 18:15


NVD link : CVE-2024-0390

Mitre link : CVE-2024-0390

CVE.ORG link : CVE-2024-0390


JSON object : View

Products Affected

inprax

  • izzi_connect
CWE
CWE-798

Use of Hard-coded Credentials