CVE-2026-6411
MAXHUB Pivot Client Application Use of a Broken or Risky Cryptographic Algorithm
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th
This vulnerability, in the MAXHUB Pivot client application versions prior to v1.36.2, may allow an attacker to obtain encrypted tenant email addresses and related metadata from any tenant. Due to the presence of a hardcoded AES key within the application, the encrypted data can be decrypted, enabling access to tenant email addresses and associated information in cleartext. Furthermore, an attacker may be able to cause a denial-of-service condition by enrolling multiple unauthorized devices into a tenant via MQTT, potentially disrupting tenant operations.
| CWE | CWE-327 |
| Vendor | maxhub |
| Product | maxhub pivot client application |
| Published | May 7, 2026 |
| Last Updated | May 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for maxhub maxhub pivot client application
Be the first to know when new high vulnerabilities affecting maxhub maxhub pivot client application are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Affected Versions
MAXHUB / MAXHUB Pivot client application
0 < 1.36.2
References
Credits
Malik MAKKES and Yassine BENGANA of Abicom Groupe OCI reported this vulnerability to MAXHUB.