The listed versions of Nexx Smart Home devices use hard-coded credentials. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) server and the ability to remotely control garage doors or smart plugs for any customer.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
12 Apr 2023, 13:17
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-798 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
First Time |
Getnexx nxg-100b Firmware
Getnexx nxal-100 Getnexx nxpg-100w Getnexx nxg-200 Getnexx Getnexx nxal-100 Firmware Getnexx nxg-200 Firmware Getnexx nxpg-100w Firmware Getnexx nxg-100b |
|
CPE | cpe:2.3:h:getnexx:nxal-100:-:*:*:*:*:*:*:* cpe:2.3:h:getnexx:nxpg-100w:-:*:*:*:*:*:*:* cpe:2.3:o:getnexx:nxg-100b_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:getnexx:nxg-100b:-:*:*:*:*:*:*:* cpe:2.3:o:getnexx:nxal-100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:getnexx:nxg-200_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:getnexx:nxg-200:-:*:*:*:*:*:*:* cpe:2.3:o:getnexx:nxpg-100w_firmware:*:*:*:*:*:*:*:* |
|
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01 - Third Party Advisory, US Government Resource |
04 Apr 2023, 17:40
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-04 17:15
Updated : 2023-11-07 04:04
NVD link : CVE-2023-1748
Mitre link : CVE-2023-1748
JSON object : View
Products Affected
getnexx
- nxal-100
- nxg-200_firmware
- nxpg-100w
- nxg-100b_firmware
- nxpg-100w_firmware
- nxal-100_firmware
- nxg-100b
- nxg-200
CWE
CWE-798
Use of Hard-coded Credentials