CVE-2023-45321
📋 TL;DR
This vulnerability in the Android Client application allows attackers on the same network to intercept MQTT broker credentials transmitted over unencrypted HTTP. It affects users who manually configure server IP addresses using method 1, exposing their authentication credentials to network eavesdropping.
💻 Affected Systems
- Bosch Android Client application
📦 What is this software?
Ctrlx Hmi Web Panel Wr2107 Firmware by Boschrexroth
View all CVEs affecting Ctrlx Hmi Web Panel Wr2107 Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full control of the MQTT broker, enabling unauthorized remote management, data manipulation, and potential lateral movement to connected systems.
Likely Case
Credentials are intercepted, allowing attackers to access the MQTT broker and potentially manipulate remote management functions.
If Mitigated
With proper network segmentation and monitoring, impact is limited to credential exposure without successful exploitation.
🎯 Exploit Status
Attack requires network access to intercept unencrypted HTTP traffic
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in advisory
Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html
Restart Required: Yes
Instructions:
1. Update to latest version from official app store 2. Ensure HTTPS is used for all communications 3. Verify configuration uses encrypted protocols
🔧 Temporary Workarounds
Network Segmentation
allIsolate HMI devices and Android clients on separate VLANs
Force HTTPS Configuration
allConfigure network devices to block HTTP traffic to the server
🧯 If You Can't Patch
- Disable manual server IP configuration method 1
- Implement network monitoring for HTTP traffic to the server IP
🔍 How to Verify
Check if Vulnerable:
Check if Android app uses HTTP instead of HTTPS when manually configuring server IP
Check Version:
Check app version in Android settings > Apps > [App Name]
Verify Fix Applied:
Verify all communications use HTTPS and credentials are encrypted
📡 Detection & Monitoring
Log Indicators:
- HTTP traffic to server IP from Android clients
- Failed MQTT authentication attempts
Network Indicators:
- Unencrypted HTTP traffic containing credentials
- ARP spoofing or MITM activity
SIEM Query:
source_ip=android_client AND dest_port=80 AND (contains(password) OR contains(username))