CVE-2022-32510

An issue was discovered on certain Nuki Home Solutions devices. The HTTP API exposed by a Bridge used an unencrypted channel to provide an administrative interface. A token can be easily eavesdropped by a malicious actor to impersonate a legitimate user and gain access to the full set of API endpoints. This affects Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2.
Configurations

No configuration.

History

07 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CWE CWE-319
Summary
  • (es) Se ha descubierto un problema en determinados dispositivos de Nuki Home Solutions. La API HTTP expuesta por un Bridge utilizó un canal no cifrado para proporcionar una interfaz administrativa. Un actor malicioso puede espiar fácilmente un token para hacerse pasar por un usuario legítimo y obtener acceso al conjunto completo de endpoints de API. Esto afecta a Nuki Bridge v1 anterior a 1.22.0 y v2 anterior a 2.13.2.

14 May 2024, 10:43

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 10:43

Updated : 2024-11-07 16:35


NVD link : CVE-2022-32510

Mitre link : CVE-2022-32510

CVE.ORG link : CVE-2022-32510


JSON object : View

Products Affected

No product.

CWE
CWE-319

Cleartext Transmission of Sensitive Information