fkie_cve-2022-32510
Vulnerability from fkie_nvd
Published
2024-05-14 10:43
Modified
2024-11-21 07:06
Severity ?
Summary
An issue was discovered on certain Nuki Home Solutions devices. The HTTP API exposed by a Bridge used an unencrypted channel to provide an administrative interface. A token can be easily eavesdropped by a malicious actor to impersonate a legitimate user and gain access to the full set of API endpoints. This affects Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on certain Nuki Home Solutions devices. The HTTP API exposed by a Bridge used an unencrypted channel to provide an administrative interface. A token can be easily eavesdropped by a malicious actor to impersonate a legitimate user and gain access to the full set of API endpoints. This affects Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2." }, { "lang": "es", "value": "Se ha descubierto un problema en determinados dispositivos de Nuki Home Solutions. La API HTTP expuesta por un Bridge utiliz\u00f3 un canal no cifrado para proporcionar una interfaz administrativa. Un actor malicioso puede espiar f\u00e1cilmente un token para hacerse pasar por un usuario leg\u00edtimo y obtener acceso al conjunto completo de endpoints de API. Esto afecta a Nuki Bridge v1 anterior a 1.22.0 y v2 anterior a 2.13.2." } ], "id": "CVE-2022-32510", "lastModified": "2024-11-21T07:06:31.367", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-05-14T10:43:42.323", "references": [ { "source": "cve@mitre.org", "url": "https://latesthackingnews.com/2022/07/28/multiple-security-flaws-found-in-nuki-smart-locks/" }, { "source": "cve@mitre.org", "url": "https://nuki.io/en/security-updates/" }, { "source": "cve@mitre.org", "url": "https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/" }, { "source": "cve@mitre.org", "url": "https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://latesthackingnews.com/2022/07/28/multiple-security-flaws-found-in-nuki-smart-locks/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://nuki.io/en/security-updates/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…