This vulnerability, in the MAXHUB Pivot client application versions prior to v1.36.2, may allow an attacker to obtain encrypted tenant email addresses and related metadata from any tenant. Due to the presence of a hardcoded AES key within the application, the encrypted data can be decrypted, enabling access to tenant email addresses and associated information in cleartext. Furthermore, an attacker may be able to cause a denial-of-service condition by enrolling multiple unauthorized devices into a tenant via MQTT, potentially disrupting tenant operations.
History

Sun, 10 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Maxhub
Maxhub pivot Client Application
Vendors & Products Maxhub
Maxhub pivot Client Application

Fri, 08 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 22:45:00 +0000

Type Values Removed Values Added
Description This vulnerability, in the MAXHUB Pivot client application versions prior to v1.36.2, may allow an attacker to obtain encrypted tenant email addresses and related metadata from any tenant. Due to the presence of a hardcoded AES key within the application, the encrypted data can be decrypted, enabling access to tenant email addresses and associated information in cleartext. Furthermore, an attacker may be able to cause a denial-of-service condition by enrolling multiple unauthorized devices into a tenant via MQTT, potentially disrupting tenant operations.
Title MAXHUB Pivot Client Application Use of a Broken or Risky Cryptographic Algorithm
Weaknesses CWE-327
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2026-05-07T22:25:54.959Z

Updated: 2026-05-08T13:06:12.227Z

Reserved: 2026-04-15T23:14:19.539Z

Link: CVE-2026-6411

cve-icon Vulnrichment

Updated: 2026-05-08T13:06:07.795Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T23:16:32.987

Modified: 2026-05-08T16:08:15.570

Link: CVE-2026-6411

cve-icon Redhat

No data.