CVE-2022-35611: n/a in n/a
A Cross-Site Request Forgery (CSRF) in MQTTRoute v3.3 and below allows attackers to create and remove dashboards.
AI Analysis
Technical Summary
CVE-2022-35611 is a Cross-Site Request Forgery (CSRF) vulnerability affecting MQTTRoute version 3.3 and earlier. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted actions to a web application in which they are currently authenticated. In this case, the vulnerability enables an attacker to create and remove dashboards within the MQTTRoute application without the user's consent. The vulnerability does not impact confidentiality or availability directly but affects the integrity of the application by allowing unauthorized modification of dashboard configurations. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The attack complexity is low (AC:L), and the scope is unchanged (S:U). There is no known exploit in the wild, and no patches or vendor information are currently available. The vulnerability is categorized under CWE-352, which is the standard identifier for CSRF issues. Since dashboards can be critical for monitoring and operational visibility in MQTT environments, unauthorized changes could disrupt monitoring or mislead operators, potentially impacting operational decisions.
Potential Impact
For European organizations using MQTTRoute, especially those relying on MQTT for IoT, industrial automation, or telemetry data, this vulnerability could lead to unauthorized dashboard manipulation. This may result in misleading or missing operational data, causing delayed or incorrect responses to system states. While the vulnerability does not directly compromise data confidentiality or system availability, the integrity loss could undermine trust in monitoring systems and lead to operational inefficiencies or errors. Organizations in sectors such as manufacturing, energy, transportation, and smart city infrastructure, where MQTT is commonly used, could be particularly affected. The impact is more pronounced in environments where dashboards are used for critical decision-making or alerting, as attackers could remove or create dashboards to hide or fabricate monitoring information.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement anti-CSRF tokens in all state-changing HTTP requests within MQTTRoute. Ensuring that the application validates the origin and referer headers can also help detect and block unauthorized requests. Network segmentation and strict access controls should be applied to limit access to the MQTTRoute management interface to trusted users and networks only. Additionally, organizations should monitor dashboard creation and deletion activities for unusual patterns. Since no official patches or vendor guidance are currently available, applying web application firewalls (WAFs) with CSRF protection rules and educating users about the risks of clicking on untrusted links while authenticated can reduce exploitation risk. Regularly updating to newer versions of MQTTRoute when available and following vendor advisories is recommended.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden
CVE-2022-35611: n/a in n/a
Description
A Cross-Site Request Forgery (CSRF) in MQTTRoute v3.3 and below allows attackers to create and remove dashboards.
AI-Powered Analysis
Technical Analysis
CVE-2022-35611 is a Cross-Site Request Forgery (CSRF) vulnerability affecting MQTTRoute version 3.3 and earlier. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted actions to a web application in which they are currently authenticated. In this case, the vulnerability enables an attacker to create and remove dashboards within the MQTTRoute application without the user's consent. The vulnerability does not impact confidentiality or availability directly but affects the integrity of the application by allowing unauthorized modification of dashboard configurations. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The attack complexity is low (AC:L), and the scope is unchanged (S:U). There is no known exploit in the wild, and no patches or vendor information are currently available. The vulnerability is categorized under CWE-352, which is the standard identifier for CSRF issues. Since dashboards can be critical for monitoring and operational visibility in MQTT environments, unauthorized changes could disrupt monitoring or mislead operators, potentially impacting operational decisions.
Potential Impact
For European organizations using MQTTRoute, especially those relying on MQTT for IoT, industrial automation, or telemetry data, this vulnerability could lead to unauthorized dashboard manipulation. This may result in misleading or missing operational data, causing delayed or incorrect responses to system states. While the vulnerability does not directly compromise data confidentiality or system availability, the integrity loss could undermine trust in monitoring systems and lead to operational inefficiencies or errors. Organizations in sectors such as manufacturing, energy, transportation, and smart city infrastructure, where MQTT is commonly used, could be particularly affected. The impact is more pronounced in environments where dashboards are used for critical decision-making or alerting, as attackers could remove or create dashboards to hide or fabricate monitoring information.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement anti-CSRF tokens in all state-changing HTTP requests within MQTTRoute. Ensuring that the application validates the origin and referer headers can also help detect and block unauthorized requests. Network segmentation and strict access controls should be applied to limit access to the MQTTRoute management interface to trusted users and networks only. Additionally, organizations should monitor dashboard creation and deletion activities for unusual patterns. Since no official patches or vendor guidance are currently available, applying web application firewalls (WAFs) with CSRF protection rules and educating users about the risks of clicking on untrusted links while authenticated can reduce exploitation risk. Regularly updating to newer versions of MQTTRoute when available and following vendor advisories is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-07-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec56c
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 9:42:06 AM
Last updated: 7/27/2025, 3:26:50 AM
Views: 10
Related Threats
CVE-2025-49456: CWE-426 Untrusted Search Path in Zoom Communications Inc Zoom Clients for Windows
MediumCVE-2025-49457: CWE-426 Untrusted Search Path in Zoom Communications Inc Zoom Clients for Windows
CriticalCVE-2025-54238: Out-of-bounds Read (CWE-125) in Adobe Dimension
MediumCVE-2025-8395
LowCVE-2025-54233: Out-of-bounds Read (CWE-125) in Adobe Adobe Framemaker
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.