This vulnerability, in the MAXHUB Pivot client application versions
prior to v1.36.2, may allow an attacker to obtain encrypted tenant email
addresses and related metadata from any tenant. Due to the presence of a
hardcoded AES key within the application, the encrypted data can be
decrypted, enabling access to tenant email addresses and associated
information in cleartext. Furthermore, an attacker may be able to cause a
denial-of-service condition by enrolling multiple unauthorized devices
into a tenant via MQTT, potentially disrupting tenant operations.
Metrics
Affected Vendors & Products
References
History
Thu, 07 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability, in the MAXHUB Pivot client application versions prior to v1.36.2, may allow an attacker to obtain encrypted tenant email addresses and related metadata from any tenant. Due to the presence of a hardcoded AES key within the application, the encrypted data can be decrypted, enabling access to tenant email addresses and associated information in cleartext. Furthermore, an attacker may be able to cause a denial-of-service condition by enrolling multiple unauthorized devices into a tenant via MQTT, potentially disrupting tenant operations. | |
| Title | MAXHUB Pivot Client Application Use of a Broken or Risky Cryptographic Algorithm | |
| Weaknesses | CWE-327 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-05-07T22:25:54.959Z
Reserved: 2026-04-15T23:14:19.539Z
Link: CVE-2026-6411
No data.
Status : Received
Published: 2026-05-07T23:16:32.987
Modified: 2026-05-07T23:16:32.987
Link: CVE-2026-6411
No data.
OpenCVE Enrichment
Updated: 2026-05-08T00:00:12Z