INPRAX "iZZi connect" application on Android contains...
Unreviewed
Published
Feb 15, 2024
to the GitHub Advisory Database
•
Updated Feb 15, 2024
Description
Published by the National Vulnerability Database
Feb 15, 2024
Published to the GitHub Advisory Database
Feb 15, 2024
Last updated
Feb 15, 2024
INPRAX "iZZi connect" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit "reQnet iZZi".This issue affects "iZZi connect" application versions before 2024010401.
References