CVE-2023-1750

7.1 HIGH

📋 TL;DR

Nexx Smart Home devices have an access control vulnerability that allows attackers with a valid device ID to access sensitive device information, modify settings, and view device history. This affects users of vulnerable NexxHome devices who haven't applied security updates. The vulnerability stems from improper authorization checks when processing device actions.

💻 Affected Systems

Products:
  • Nexx Smart Home devices (specific models not detailed in advisory)
Versions: Versions prior to patch (specific version numbers not provided in advisory)
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices connected to NexxHome cloud service. Requires attacker to obtain valid device ID through other means.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could take full control of smart home devices, disable security systems, access private device usage history, and potentially chain with other vulnerabilities for broader home network compromise.

🟠

Likely Case

Unauthorized access to device settings and history, enabling surveillance of device usage patterns and potential manipulation of device functionality.

🟢

If Mitigated

Proper access controls would limit actions to authenticated owners only, preventing unauthorized access even with device IDs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid device ID but no authentication. Device IDs may be obtainable through other attack vectors or information disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory - check vendor updates

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01

Restart Required: Yes

Instructions:

1. Check Nexx device firmware version. 2. Update to latest firmware via Nexx mobile app. 3. Verify update completion. 4. Restart device if required by update process.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate smart home devices on separate VLAN or network segment

Disable Cloud Access

all

Configure devices for local-only operation if supported

🧯 If You Can't Patch

  • Disconnect vulnerable devices from internet and use local-only functionality
  • Monitor network traffic for unauthorized access attempts to device APIs

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in Nexx mobile app against latest available version

Check Version:

Use Nexx mobile app: Device Settings > About > Firmware Version

Verify Fix Applied:

Confirm firmware update applied successfully and test device functionality

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized API calls to device endpoints
  • Multiple failed authentication attempts followed by successful device access

Network Indicators:

  • Unusual traffic patterns to Nexx cloud services
  • API requests to device endpoints from unexpected IP addresses

SIEM Query:

source="nexx-device" AND (action="set_settings" OR action="get_history") AND user="unknown"

🔗 References

📤 Share & Export