Skip to main content

CVE-2022-35611: n/a in n/a

Medium
VulnerabilityCVE-2022-35611cvecve-2022-35611
Published: Thu Oct 13 2022 (10/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A Cross-Site Request Forgery (CSRF) in MQTTRoute v3.3 and below allows attackers to create and remove dashboards.

AI-Powered Analysis

AILast updated: 07/06/2025, 09:42:06 UTC

Technical Analysis

CVE-2022-35611 is a Cross-Site Request Forgery (CSRF) vulnerability affecting MQTTRoute version 3.3 and earlier. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted actions to a web application in which they are currently authenticated. In this case, the vulnerability enables an attacker to create and remove dashboards within the MQTTRoute application without the user's consent. The vulnerability does not impact confidentiality or availability directly but affects the integrity of the application by allowing unauthorized modification of dashboard configurations. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The attack complexity is low (AC:L), and the scope is unchanged (S:U). There is no known exploit in the wild, and no patches or vendor information are currently available. The vulnerability is categorized under CWE-352, which is the standard identifier for CSRF issues. Since dashboards can be critical for monitoring and operational visibility in MQTT environments, unauthorized changes could disrupt monitoring or mislead operators, potentially impacting operational decisions.

Potential Impact

For European organizations using MQTTRoute, especially those relying on MQTT for IoT, industrial automation, or telemetry data, this vulnerability could lead to unauthorized dashboard manipulation. This may result in misleading or missing operational data, causing delayed or incorrect responses to system states. While the vulnerability does not directly compromise data confidentiality or system availability, the integrity loss could undermine trust in monitoring systems and lead to operational inefficiencies or errors. Organizations in sectors such as manufacturing, energy, transportation, and smart city infrastructure, where MQTT is commonly used, could be particularly affected. The impact is more pronounced in environments where dashboards are used for critical decision-making or alerting, as attackers could remove or create dashboards to hide or fabricate monitoring information.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement anti-CSRF tokens in all state-changing HTTP requests within MQTTRoute. Ensuring that the application validates the origin and referer headers can also help detect and block unauthorized requests. Network segmentation and strict access controls should be applied to limit access to the MQTTRoute management interface to trusted users and networks only. Additionally, organizations should monitor dashboard creation and deletion activities for unusual patterns. Since no official patches or vendor guidance are currently available, applying web application firewalls (WAFs) with CSRF protection rules and educating users about the risks of clicking on untrusted links while authenticated can reduce exploitation risk. Regularly updating to newer versions of MQTTRoute when available and following vendor advisories is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec56c

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 9:42:06 AM

Last updated: 7/27/2025, 3:26:50 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats