Hard-coded MQTT Queue Credentials in iZZi connect Android App Allows Unauthorized Access to reQnet iZZi Recuperation Unit

Hard-coded MQTT Queue Credentials in iZZi connect Android App Allows Unauthorized Access to reQnet iZZi Recuperation Unit

CVE-2024-0390 · Severity

INPRAX "iZZi connect" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit "reQnet iZZi".This issue affects "iZZi connect" application versions before 2024010401.

Learn more about our Cis Benchmark Audit For Google Android.