CVE-2023-45851

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to intercept or manipulate MQTT communications between Android Client applications and AppHub servers due to missing server authentication. Attackers can force devices to connect to malicious MQTT brokers and send fake messages to HMI devices. This affects Android Client applications enrolled with Bosch AppHub servers.

💻 Affected Systems

Products:
  • Bosch Android Client application for AppHub
Versions: Specific versions not detailed in advisory, but all versions before patched release are affected
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android Client applications enrolled to AppHub servers. Requires MQTT broker connectivity.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of HMI device control, allowing attackers to send malicious commands, disrupt operations, or manipulate industrial processes through fake messages.

🟠

Likely Case

Data interception, message manipulation, or denial of service by redirecting MQTT traffic to attacker-controlled brokers.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass remains possible.

🌐 Internet-Facing: MEDIUM - Requires attacker to be on same network or intercept traffic, but MQTT brokers may be internet-accessible.
🏢 Internal Only: HIGH - Internal network attackers can easily exploit this to intercept or manipulate communications between Android clients and HMI devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to intercept or redirect MQTT traffic. No authentication needed to force connections to malicious brokers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory, but vendor recommends updating to latest version

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html

Restart Required: Yes

Instructions:

1. Update Android Client application to latest version from official source. 2. Ensure AppHub server is updated if required. 3. Restart Android devices after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate MQTT broker and Android clients on separate VLANs with strict firewall rules

VPN Enforcement

all

Require VPN for all Android client connections to AppHub infrastructure

🧯 If You Can't Patch

  • Implement network monitoring for unexpected MQTT broker connections
  • Use certificate pinning or enforce TLS with proper certificate validation for MQTT connections

🔍 How to Verify

Check if Vulnerable:

Check Android Client app version and verify if it connects to MQTT broker without certificate validation. Monitor network traffic for unauthenticated MQTT connections.

Check Version:

Check app version in Android settings > Apps > [App Name] > App info

Verify Fix Applied:

Verify updated app version and test MQTT connections require proper server authentication/certificate validation.

📡 Detection & Monitoring

Log Indicators:

  • Failed certificate validation logs
  • Unexpected MQTT broker connection attempts
  • Authentication errors for MQTT connections

Network Indicators:

  • Unencrypted MQTT traffic on port 1883
  • MQTT connections to unexpected IP addresses
  • Lack of TLS handshake for MQTT connections

SIEM Query:

source="network_traffic" dest_port=1883 OR dest_port=8883 AND protocol="mqtt" AND NOT (tls_version=* OR ssl_handshake=success)

🔗 References

📤 Share & Export