Lucene search

K
cve[email protected]CVE-2023-45321
HistoryOct 25, 2023 - 6:17 p.m.

CVE-2023-45321

2023-10-2518:17:33
CWE-319
web.nvd.nist.gov
10
android
client application
http
https
sensitive information
encryption
mqtt
remote management
security vulnerability
cve-2023-45321

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

The Android Client application, when enrolled with the define method 1 (the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user. Due to the lack of encryption of HTTP,this issue allows an attacker placed in the same subnet network of the HMI device to intercept username and password necessary to authenticate to the MQTT server responsible to implement the remote management protocol.

Affected configurations

NVD
Node
boschrexrothctrlx_hmi_web_panel_wr2107_firmware
AND
boschrexrothctrlx_hmi_web_panel_wr2107Match-
Node
boschrexrothctrlx_hmi_web_panel_wr2110_firmware
AND
boschrexrothctrlx_hmi_web_panel_wr2110Match-
Node
boschrexrothctrlx_hmi_web_panel_wr2115_firmware
AND
boschrexrothctrlx_hmi_web_panel_wr2115Match-

CNA Affected

[
  {
    "vendor": "Bosch Rexroth AG",
    "product": "ctrlX HMI Web Panel - WR21 (WR2107)",
    "versions": [
      {
        "version": "all",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Bosch Rexroth AG",
    "product": "ctrlX HMI Web Panel - WR21 (WR2110)",
    "versions": [
      {
        "version": "all",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Bosch Rexroth AG",
    "product": "ctrlX HMI Web Panel - WR21 (WR2115)",
    "versions": [
      {
        "version": "all",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

Related for CVE-2023-45321