Lucene search

K
cvelistASRGCVELIST:CVE-2023-3028
HistoryJun 01, 2023 - 5:34 a.m.

CVE-2023-3028 Improper backend communication allows access and manipulation of the telemetry data

2023-06-0105:34:48
CWE-319
CWE-287
CWE-345
ASRG
www.cve.org
2
mqtt
telemetry data
unauthorized access
insecure backend
can bus

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

9.9

Confidence

High

EPSS

0.001

Percentile

46.5%

Insufficient authentication in the MQTT backend (broker) allows an attacker to access and even manipulate the telemetry data of the entire fleet of vehicles using the HopeChart HQT-401 telematics unit. Other models are possibly affected too.

Multiple vulnerabilities were identified:

  • The MQTT backend does not require authentication, allowing unauthorized connections from an attacker.

  • The vehicles publish their telemetry data (e.g. GPS Location, speed, odometer, fuel, etc) as messages in public topics. The backend also sends commands to the vehicles as MQTT posts in public topics. As a result, an attacker can access the confidential data of the entire fleet that is managed by the backend.

  • The MQTT messages sent by the vehicles or the backend are not encrypted or authenticated. An attacker can create and post messages to impersonate a vehicle or the backend. The attacker could then, for example, send incorrect information to the backend about the vehicle’s location.

  • The backend can inject data into a vehicleΒ΄s CAN bus by sending a specific MQTT message on a public topic. Because these messages are not authenticated or encrypted, an attacker could impersonate the backend, create a fake message and inject CAN data in any vehicle managed by the backend.

The confirmed version isΒ 201808021036, however further versions have been also identified as potentially impacted.

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "HQT401",
    "vendor": "Hangzhou Hopechart IoT Technology Co., Ltd.",
    "versions": [
      {
        "status": "affected",
        "version": "201808021036"
      }
    ]
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

9.9

Confidence

High

EPSS

0.001

Percentile

46.5%

Related for CVELIST:CVE-2023-3028