CVE-2023-33372

Connected IO v2.1.0 and prior uses a hard-coded username/password pair embedded in their device's firmware used for device communication using MQTT. An attacker who gained access to these credentials is able to connect to the MQTT broker and send messages on behalf of devices, impersonating them. in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:connectedio:connected_io:*:*:*:*:*:*:*:*

History

08 Aug 2023, 19:54

Type Values Removed Values Added
CWE CWE-798
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:connectedio:connected_io:*:*:*:*:*:*:*:*
References (MISC) https://claroty.com/team82/disclosure-dashboard/cve-2023-33372 - (MISC) https://claroty.com/team82/disclosure-dashboard/cve-2023-33372 - Third Party Advisory
References (MISC) https://www.connectedio.com/products/routers - (MISC) https://www.connectedio.com/products/routers - Product

04 Aug 2023, 18:53

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-04 18:15

Updated : 2024-02-05 00:01


NVD link : CVE-2023-33372

Mitre link : CVE-2023-33372

CVE.ORG link : CVE-2023-33372


JSON object : View

Products Affected

connectedio

  • connected_io
CWE
CWE-798

Use of Hard-coded Credentials