A cleartext transmission of sensitive information vulnerability is present in Hickory Smart Ethernet Bridge from Belwith Products, LLC. Captured data reveals that the Hickory Smart Ethernet Bridge device communicates over the network to an MQTT broker without using encryption. This exposed the default username and password used to authenticate to the MQTT broker. This issue affects Hickory Smart Ethernet Bridge, model number H077646. The firmware does not appear to contain versioning information.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.rapid7.com/2019/08/01/r7-2019-18-multiple-hickory-smart-lock-vulnerabilities/ - Third Party Advisory | |
References | () https://hickoryhardware.com/products/hickory-smart-ethernet-bridge?variant=20882150228086 - Product |
Information
Published : 2019-08-22 14:15
Updated : 2024-11-21 04:45
NVD link : CVE-2019-5635
Mitre link : CVE-2019-5635
CVE.ORG link : CVE-2019-5635
JSON object : View
Products Affected
belwith-keeler
- hickory_smart_ethernet_bridge_firmware
- hickory_smart_ethernet_bridge
CWE
CWE-319
Cleartext Transmission of Sensitive Information