INPRAX "iZZi connect" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit "reQnet iZZi".This issue affects "iZZi connect" application versions before 2024010401.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 23 Jan 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Inprax
Inprax izzi Connect |
|
CPEs | cpe:2.3:a:inprax:izzi_connect:*:*:*:*:*:android:*:* | |
Vendors & Products |
Inprax
Inprax izzi Connect |
|
Metrics |
cvssV3_1
|
Thu, 07 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: CERT-PL
Published: 2024-02-15T09:11:14.559Z
Updated: 2025-03-13T17:58:39.772Z
Reserved: 2024-01-10T08:24:47.234Z
Link: CVE-2024-0390

Updated: 2024-08-01T18:04:49.430Z

Status : Modified
Published: 2024-02-15T10:15:09.043
Modified: 2025-03-13T18:15:36.243
Link: CVE-2024-0390

No data.