An issue was discovered on certain Nuki Home Solutions devices. The HTTP API exposed by a Bridge used an unencrypted channel to provide an administrative interface. A token can be easily eavesdropped by a malicious actor to impersonate a legitimate user and gain access to the full set of API endpoints. This affects Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2.
References
Configurations
No configuration.
History
07 Nov 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-319 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
Summary |
|
14 May 2024, 10:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-14 10:43
Updated : 2024-11-07 16:35
NVD link : CVE-2022-32510
Mitre link : CVE-2022-32510
CVE.ORG link : CVE-2022-32510
JSON object : View
Products Affected
No product.
CWE
CWE-319
Cleartext Transmission of Sensitive Information