The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication.
This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device
References
Link | Resource |
---|---|
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2023-10-25 18:17
Updated : 2023-11-06 14:33
NVD link : CVE-2023-45851
Mitre link : CVE-2023-45851
CVE.ORG link : CVE-2023-45851
JSON object : View
Products Affected
boschrexroth
- ctrlx_hmi_web_panel_wr2107_firmware
- ctrlx_hmi_web_panel_wr2110
- ctrlx_hmi_web_panel_wr2107
- ctrlx_hmi_web_panel_wr2115_firmware
- ctrlx_hmi_web_panel_wr2115
- ctrlx_hmi_web_panel_wr2110_firmware
CWE
CWE-306
Missing Authentication for Critical Function