The listed versions of Nexx Smart Home devices use hard-coded credentials. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) server and the ability to remotely control garage doors or smart plugs for any customer.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2023-04-04 17:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-1748
Mitre link : CVE-2023-1748
CVE.ORG link : CVE-2023-1748
JSON object : View
Products Affected
getnexx
- nxg-200_firmware
- nxpg-100w_firmware
- nxg-100b_firmware
- nxg-100b
- nxg-200
- nxpg-100w
- nxal-100
- nxal-100_firmware
CWE
CWE-798
Use of Hard-coded Credentials