{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-45851","assignerOrgId":"c95f66b2-7e7c-41c5-8f09-6f86ec68659c","state":"PUBLISHED","assignerShortName":"bosch","dateReserved":"2023-10-18T09:35:22.524Z","datePublished":"2023-10-25T14:18:08.811Z","dateUpdated":"2024-09-11T18:06:40.524Z"},"containers":{"cna":{"providerMetadata":{"orgId":"c95f66b2-7e7c-41c5-8f09-6f86ec68659c","shortName":"bosch","dateUpdated":"2023-10-25T14:18:08.811Z"},"descriptions":[{"lang":"en","value":"The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication. \r\n\r\n\r\nThis issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device"}],"affected":[{"vendor":"Bosch Rexroth AG","product":"ctrlX HMI Web Panel - WR21 (WR2107)","versions":[{"version":"all","status":"affected"}]},{"vendor":"Bosch Rexroth AG","product":"ctrlX HMI Web Panel - WR21 (WR2110)","versions":[{"version":"all","status":"affected"}]},{"vendor":"Bosch Rexroth AG","product":"ctrlX HMI Web Panel - WR21 (WR2115)","versions":[{"version":"all","status":"affected"}]}],"problemTypes":[{"descriptions":[{"lang":"en-US","description":"CWE-306 Missing Authentication for Critical Function","cweId":"CWE-306"}]}],"references":[{"url":"https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html","name":"https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html","tags":["vendor-advisory"]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T20:29:32.293Z"},"title":"CVE Program Container","references":[{"url":"https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html","name":"https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html","tags":["vendor-advisory","x_transferred"]}]},{"affected":[{"vendor":"boschrexroth","product":"ctrlx_hmi_web_panel_wr2107","cpes":["cpe:2.3:h:boschrexroth:ctrlx_hmi_web_panel_wr2107:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"RC7(Build date 20231107)","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-11T16:00:27.264096Z","id":"CVE-2023-45851","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T18:06:40.524Z"}}]}}