Unauthenticated Remote Attackers Can Write Memory Out of Bounds Due to Input Validation Flaw in MQTT Stack
CVE-2024-26001

9.8CRITICAL

Key Information:

Vendor
CVE Published:
12 March 2024

Summary

A vulnerability exists in the MQTT stack of products developed by Affected Vendor, allowing unauthenticated remote attackers to potentially manipulate memory beyond the intended bounds due to inadequate input validation mechanisms. Although this vulnerability could enable an attacker to exploit the affected systems, the success of brute force attempts may vary due to memory randomization techniques implemented within the software.

Affected Version(s)

CHARX SEC-3000 0 <= 1.5.0

CHARX SEC-3050 0 <= 1.5.0

CHARX SEC-3100 0 <= 1.5.0

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Peter Geissler
Rick De Jager
Carlo Meijer
.