The listed versions of Nexx Smart Home devices use hard-coded credentials. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) server and the ability to remotely control garage door...
10CVSS
9.3AI Score
0.003EPSS
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could send API requests that the affected devices would execute.
6.5CVSS
6.5AI Score
0.001EPSS
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information.
7.1CVSS
6.9AI Score
0.001EPSS
The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which lea...
7.5CVSS
5.2AI Score
0.001EPSS
The listed versions of Nexx Smart Home devices could allow any user to register an already registered alarm or associated device with only the deviceβs MAC address.
8.1CVSS
4.7AI Score
0.001EPSS