CVE-2026-32324
Embedded Key Material in Anviz CX7 Firmware Enables MQTT Decryption
Publication date: 2026-04-17
Last updated on: 2026-05-04
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| anviz | cx7_firmware | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in Anviz CX7 Firmware arises because the application embeds reusable certificate and key material. This flaw allows attackers to decrypt MQTT traffic and potentially interact with the device's messaging channels on a large scale.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized decryption of MQTT communications, which compromises the confidentiality and integrity of the data transmitted. Attackers could intercept sensitive information and manipulate device messaging channels, potentially disrupting device operations or gaining unauthorized access.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Anviz CX7 Firmware involves embedded reusable certificate/key material that enables decryption of MQTT traffic and potential unauthorized interaction with device messaging channels. This could lead to unauthorized access to sensitive data transmitted by the device.
Such unauthorized access and potential data exposure may impact compliance with data protection regulations like GDPR and HIPAA, which require protection of sensitive personal and health information during transmission and storage.
However, specific impacts on compliance depend on the context of device deployment and data handled, which is not detailed in the provided information.