This vulnerability, in the MAXHUB Pivot client application versions
prior to v1.36.2, may allow an attacker to obtain encrypted tenant email
addresses and related metadata from any tenant. Due to the presence of a
hardcoded AES key within the application, the encrypted data can be
decrypted, enabling access to tenant email addresses and associated
information in cleartext. Furthermore, an attacker may be able to cause a
denial-of-service condition by enrolling multiple unauthorized devices
into a tenant via MQTT, potentially disrupting tenant operations.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

MAXHUB recommends users upgrade the Pivot client application to v1.36.2 or newer. The remediation has been made available through an OTA update. Users running v1.36.2 or later are not affected and need only ensure they continue to maintain the latest version. At this time, MAXHUB is not aware of any public exploitation of this issue. For more information, see the MAXHUB support page. https://www.maxhub.com/en/support/


Workaround

No workaround given by the vendor.

History

Thu, 07 May 2026 22:45:00 +0000

Type Values Removed Values Added
Description This vulnerability, in the MAXHUB Pivot client application versions prior to v1.36.2, may allow an attacker to obtain encrypted tenant email addresses and related metadata from any tenant. Due to the presence of a hardcoded AES key within the application, the encrypted data can be decrypted, enabling access to tenant email addresses and associated information in cleartext. Furthermore, an attacker may be able to cause a denial-of-service condition by enrolling multiple unauthorized devices into a tenant via MQTT, potentially disrupting tenant operations.
Title MAXHUB Pivot Client Application Use of a Broken or Risky Cryptographic Algorithm
Weaknesses CWE-327
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-05-07T22:25:54.959Z

Reserved: 2026-04-15T23:14:19.539Z

Link: CVE-2026-6411

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-07T23:16:32.987

Modified: 2026-05-07T23:16:32.987

Link: CVE-2026-6411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses