Remote command execution vulnerability in Bosch's Android Client for HMI devices
CVE-2023-46102

8.8HIGH

What is CVE-2023-46102?

The Android Client application by Bosch, when connected to the AppHub server, utilizes a flawed implementation of the MQTT protocol for device management. The communication relies on encryption via a hard-coded DES symmetric key, which can be easily extracted through reverse engineering of the client and server applications. This vulnerability allows an attacker controlling an unauthorized MQTT broker on the same network to send crafted messages, potentially executing arbitrary commands on the HMI device. This poses substantial risks, enabling malicious actors to manipulate device operations without authentication.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

ctrlX HMI Web Panel - WR21 (WR2107) all

ctrlX HMI Web Panel - WR21 (WR2110) all

ctrlX HMI Web Panel - WR21 (WR2115) all

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.