Vulnerabilities
Vulnerable Software
Getnexx:  Security Vulnerabilities
The listed versions of Nexx Smart Home devices use hard-coded credentials. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) server and the ability to remotely control garage doors or smart plugs for any customer.
CVSS Score
9.3
EPSS Score
0.001
Published
2023-04-04
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could send API requests that the affected devices would execute.
CVSS Score
6.5
EPSS Score
0.002
Published
2023-04-04
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information.
CVSS Score
7.1
EPSS Score
0.002
Published
2023-04-04
The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which leak a deviceId.
CVSS Score
7.5
EPSS Score
0.002
Published
2023-04-04
The listed versions of Nexx Smart Home devices could allow any user to register an already registered alarm or associated device with only the device’s MAC address.
CVSS Score
8.1
EPSS Score
0.001
Published
2023-04-04


Contact Us

Shodan ® - All rights reserved