CVE-2022-35611: n/a in n/a
A Cross-Site Request Forgery (CSRF) in MQTTRoute v3.3 and below allows attackers to create and remove dashboards.
AI Analysis
Technical Summary
CVE-2022-35611 is a Cross-Site Request Forgery (CSRF) vulnerability affecting MQTTRoute version 3.3 and earlier. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted actions to a web application in which they are currently authenticated. In this case, the vulnerability enables an attacker to create and remove dashboards within the MQTTRoute application without the user's consent. The vulnerability does not impact confidentiality or availability directly but affects the integrity of the application by allowing unauthorized modification of dashboard configurations. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The attack complexity is low (AC:L), and the scope is unchanged (S:U). There is no known exploit in the wild, and no patches or vendor information are currently available. The vulnerability is categorized under CWE-352, which is the standard identifier for CSRF issues. Since dashboards can be critical for monitoring and operational visibility in MQTT environments, unauthorized changes could disrupt monitoring or mislead operators, potentially impacting operational decisions.
Potential Impact
For European organizations using MQTTRoute, especially those relying on MQTT for IoT, industrial automation, or telemetry data, this vulnerability could lead to unauthorized dashboard manipulation. This may result in misleading or missing operational data, causing delayed or incorrect responses to system states. While the vulnerability does not directly compromise data confidentiality or system availability, the integrity loss could undermine trust in monitoring systems and lead to operational inefficiencies or errors. Organizations in sectors such as manufacturing, energy, transportation, and smart city infrastructure, where MQTT is commonly used, could be particularly affected. The impact is more pronounced in environments where dashboards are used for critical decision-making or alerting, as attackers could remove or create dashboards to hide or fabricate monitoring information.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement anti-CSRF tokens in all state-changing HTTP requests within MQTTRoute. Ensuring that the application validates the origin and referer headers can also help detect and block unauthorized requests. Network segmentation and strict access controls should be applied to limit access to the MQTTRoute management interface to trusted users and networks only. Additionally, organizations should monitor dashboard creation and deletion activities for unusual patterns. Since no official patches or vendor guidance are currently available, applying web application firewalls (WAFs) with CSRF protection rules and educating users about the risks of clicking on untrusted links while authenticated can reduce exploitation risk. Regularly updating to newer versions of MQTTRoute when available and following vendor advisories is recommended.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden
CVE-2022-35611: n/a in n/a
Description
A Cross-Site Request Forgery (CSRF) in MQTTRoute v3.3 and below allows attackers to create and remove dashboards.
AI-Powered Analysis
Technical Analysis
CVE-2022-35611 is a Cross-Site Request Forgery (CSRF) vulnerability affecting MQTTRoute version 3.3 and earlier. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted actions to a web application in which they are currently authenticated. In this case, the vulnerability enables an attacker to create and remove dashboards within the MQTTRoute application without the user's consent. The vulnerability does not impact confidentiality or availability directly but affects the integrity of the application by allowing unauthorized modification of dashboard configurations. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The attack complexity is low (AC:L), and the scope is unchanged (S:U). There is no known exploit in the wild, and no patches or vendor information are currently available. The vulnerability is categorized under CWE-352, which is the standard identifier for CSRF issues. Since dashboards can be critical for monitoring and operational visibility in MQTT environments, unauthorized changes could disrupt monitoring or mislead operators, potentially impacting operational decisions.
Potential Impact
For European organizations using MQTTRoute, especially those relying on MQTT for IoT, industrial automation, or telemetry data, this vulnerability could lead to unauthorized dashboard manipulation. This may result in misleading or missing operational data, causing delayed or incorrect responses to system states. While the vulnerability does not directly compromise data confidentiality or system availability, the integrity loss could undermine trust in monitoring systems and lead to operational inefficiencies or errors. Organizations in sectors such as manufacturing, energy, transportation, and smart city infrastructure, where MQTT is commonly used, could be particularly affected. The impact is more pronounced in environments where dashboards are used for critical decision-making or alerting, as attackers could remove or create dashboards to hide or fabricate monitoring information.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement anti-CSRF tokens in all state-changing HTTP requests within MQTTRoute. Ensuring that the application validates the origin and referer headers can also help detect and block unauthorized requests. Network segmentation and strict access controls should be applied to limit access to the MQTTRoute management interface to trusted users and networks only. Additionally, organizations should monitor dashboard creation and deletion activities for unusual patterns. Since no official patches or vendor guidance are currently available, applying web application firewalls (WAFs) with CSRF protection rules and educating users about the risks of clicking on untrusted links while authenticated can reduce exploitation risk. Regularly updating to newer versions of MQTTRoute when available and following vendor advisories is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-07-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec56c
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 9:42:06 AM
Last updated: 9/23/2025, 12:28:38 AM
Views: 16
Related Threats
CVE-2025-10993: Code Injection in MuYuCMS
MediumCVE-2025-10992: Improper Authorization in roncoo roncoo-pay
MediumCVE-2025-60251: CWE-306 Missing Authentication for Critical Function in Unitree Go2
MediumCVE-2025-60250: CWE-321 Use of Hard-coded Cryptographic Key in Unitree Go2
MediumCVE-2025-60017: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Unitree Go2
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.