INPRAX "iZZi connect" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit "reQnet iZZi".This issue affects "iZZi connect" application versions before 2024010401.
References
Link | Resource |
---|---|
https://cert.pl/en/posts/2024/02/CVE-2024-0390/ | Third Party Advisory |
https://cert.pl/posts/2024/02/CVE-2024-0390/ | Third Party Advisory |
https://cert.pl/en/posts/2024/02/CVE-2024-0390/ | Third Party Advisory |
https://cert.pl/posts/2024/02/CVE-2024-0390/ | Third Party Advisory |
Configurations
History
23 Jan 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Inprax izzi Connect
Inprax |
|
References | () https://cert.pl/en/posts/2024/02/CVE-2024-0390/ - Third Party Advisory | |
References | () https://cert.pl/posts/2024/02/CVE-2024-0390/ - Third Party Advisory | |
CPE | cpe:2.3:a:inprax:izzi_connect:*:*:*:*:*:android:*:* |
Information
Published : 2024-02-15 10:15
Updated : 2025-03-13 18:15
NVD link : CVE-2024-0390
Mitre link : CVE-2024-0390
CVE.ORG link : CVE-2024-0390
JSON object : View
Products Affected
inprax
- izzi_connect
CWE
CWE-798
Use of Hard-coded Credentials