{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7415","assignerOrgId":"26969f82-7e87-44d8-9cb5-f6fb926ddd43","state":"PUBLISHED","assignerShortName":"AHA","dateReserved":"2026-04-29T13:55:11.141Z","datePublished":"2026-05-07T16:11:16.943Z","dateUpdated":"2026-05-07T17:04:31.177Z"},"containers":{"cna":{"providerMetadata":{"orgId":"26969f82-7e87-44d8-9cb5-f6fb926ddd43","shortName":"AHA","dateUpdated":"2026-05-07T16:11:16.943Z"},"title":"Open MQTT orchestration without read/write ACLs in Yarbo robot firmware","datePublic":"2026-05-07T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-306","description":"CWE-306 Missing authentication for critical function","type":"CWE"}]}],"affected":[{"vendor":"Yarbo","product":"Firmware","versions":[{"status":"affected","version":"0","lessThanOrEqual":"2.3.9","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The MQTT broker embedded in Yarbo firmware v2.3.9 is configured to allow anonymous connections with no topic-level read or write ACLs. Any host on the same network can subscribe to sensitive telemetry topics or publish control messages directly to the robot without authentication or authorization of any kind.","supportingMedia":[{"type":"text/html","base64":false,"value":"The MQTT broker embedded in Yarbo firmware v2.3.9 is configured to allow anonymous connections with no topic-level read or write ACLs. Any host on the same network can subscribe to sensitive telemetry topics or publish control messages directly to the robot without authentication or authorization of any kind."}]}],"references":[{"url":"https://github.com/Bin4ry/yarbo-nat-in-my-back-yard","tags":["third-party-advisory"]},{"url":"https://takeonme.org/gcves/GCVE-1337-2026-00000000000000000000000000000000000000000000000000111111111100111111111110000000000000000000000000000000000000000000000000000001001","tags":["third-party-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"CRITICAL","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}}],"credits":[{"lang":"en","value":"Andreas Makris (aka Bin4ry)","type":"finder"},{"lang":"en","value":"todb of AHA!","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 1.0.2"}},"adp":[{"references":[{"url":"https://github.com/Bin4ry/yarbo-nat-in-my-back-yard","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-07T17:04:20.271427Z","id":"CVE-2026-7415","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-07T17:04:31.177Z"}}]}}