← Back to CVEs
CVE-2024-0390
CRITICAL9.8
Description
INPRAX "iZZi connect" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit "reQnet iZZi".This issue affects "iZZi connect" application versions before 2024010401.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/15/2024
Last Modified3/13/2025
Sourcenvd
Honeypot Sightings0
Affected Products
inprax:izzi_connect
Weaknesses (CWE)
CWE-798CWE-798
References
https://cert.pl/en/posts/2024/02/CVE-2024-0390/(cvd@cert.pl)
https://cert.pl/posts/2024/02/CVE-2024-0390/(cvd@cert.pl)
https://cert.pl/en/posts/2024/02/CVE-2024-0390/(af854a3a-2127-422b-91ae-364da2661108)
https://cert.pl/posts/2024/02/CVE-2024-0390/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.