Lucene search

K

5 matches found

CVE
CVE
added 2023/04/04 5:15 p.m.63 views

CVE-2023-1748

The listed versions of Nexx Smart Home devices use hard-coded credentials. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) server and the ability to remotely control garage door...

10CVSS9.6AI score0.00089EPSS
CVE
CVE
added 2023/04/04 5:15 p.m.47 views

CVE-2023-1751

The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which lea...

7.5CVSS6AI score0.00231EPSS
CVE
CVE
added 2023/04/04 5:15 p.m.35 views

CVE-2023-1752

The listed versions of Nexx Smart Home devices could allow any user to register an already registered alarm or associated device with only the device’s MAC address.

8.1CVSS5.7AI score0.00132EPSS
CVE
CVE
added 2023/04/04 5:15 p.m.34 views

CVE-2023-1749

The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could send API requests that the affected devices would execute.

6.5CVSS6.8AI score0.00153EPSS
CVE
CVE
added 2023/04/04 5:15 p.m.33 views

CVE-2023-1750

The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information.

7.1CVSS7.1AI score0.00214EPSS