The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which leak a deviceId.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
12 Apr 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
First Time |
Getnexx nxg-100b Firmware
Getnexx nxal-100 Getnexx nxpg-100w Getnexx nxg-200 Getnexx Getnexx nxal-100 Firmware Getnexx nxg-200 Firmware Getnexx nxpg-100w Firmware Getnexx nxg-100b |
|
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01 - Third Party Advisory, US Government Resource | |
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:h:getnexx:nxal-100:-:*:*:*:*:*:*:* cpe:2.3:h:getnexx:nxpg-100w:-:*:*:*:*:*:*:* cpe:2.3:o:getnexx:nxg-100b_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:getnexx:nxg-100b:-:*:*:*:*:*:*:* cpe:2.3:o:getnexx:nxal-100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:getnexx:nxg-200_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:getnexx:nxg-200:-:*:*:*:*:*:*:* cpe:2.3:o:getnexx:nxpg-100w_firmware:*:*:*:*:*:*:*:* |
04 Apr 2023, 17:40
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-04 17:15
Updated : 2023-11-07 04:04
NVD link : CVE-2023-1751
Mitre link : CVE-2023-1751
JSON object : View
Products Affected
getnexx
- nxal-100
- nxg-200_firmware
- nxpg-100w
- nxg-100b_firmware
- nxpg-100w_firmware
- nxal-100_firmware
- nxg-100b
- nxg-200
CWE