<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MAXHUB — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/maxhub/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/maxhub/feed.xml" rel="self" type="application/rss+xml"/><item><title>MAXHUB Pivot Client Application Vulnerability CVE-2026-6411</title><link>https://feed.craftedsignal.io/briefs/2026-05-maxhub-pivot-vuln/</link><pubDate>Thu, 07 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-maxhub-pivot-vuln/</guid><description>A vulnerability exists in MAXHUB Pivot client application versions prior to v1.36.2, where a hardcoded AES key allows attackers to decrypt tenant email addresses and associated metadata, and potentially cause a denial-of-service via unauthorized device enrollment through MQTT.</description><content:encoded><![CDATA[<p>A vulnerability, identified as CVE-2026-6411, affects the MAXHUB Pivot client application versions prior to v1.36.2. The vulnerability stems from the presence of a hardcoded AES key within the application. Successful exploitation allows an attacker to obtain encrypted tenant email addresses and related metadata from any tenant. The encrypted data can be decrypted, enabling access to tenant email addresses and associated information in cleartext. Additionally, an attacker may be able to cause a denial-of-service (DoS) condition by enrolling multiple unauthorized devices into a tenant via MQTT, potentially disrupting tenant operations. This issue was reported to MAXHUB by Malik MAKKES and Yassine BENGANA of Abicom Groupe OCI.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a MAXHUB Pivot client application running a version prior to v1.36.2.</li>
<li>The attacker gains access to the application&rsquo;s installation directory or memory to extract the hardcoded AES key.</li>
<li>The attacker intercepts network traffic or accesses local data stores where tenant email addresses and metadata are stored in encrypted form.</li>
<li>The attacker uses the extracted AES key to decrypt the intercepted data, revealing tenant email addresses and associated information in cleartext.</li>
<li>(Optional) The attacker enrolls multiple unauthorized devices into a tenant via MQTT, leveraging the vulnerability to flood the system with requests.</li>
<li>The excessive number of enrolled devices overwhelms the tenant&rsquo;s resources, leading to a denial-of-service condition.</li>
<li>Legitimate users are unable to access or use the MAXHUB Pivot client application, disrupting tenant operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6411 allows an attacker to access sensitive tenant email addresses and associated metadata in cleartext. This information could be used for further malicious activities, such as phishing or identity theft. Furthermore, an attacker may trigger a denial-of-service condition by enrolling multiple unauthorized devices into a tenant via MQTT, which disrupts tenant operations and potentially leads to financial losses due to downtime and recovery efforts. There is no known public exploitation specifically targeting this vulnerability reported to CISA at this time.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the MAXHUB Pivot client application to version v1.36.2 or newer to remediate CVE-2026-6411, as recommended by MAXHUB in their advisory.</li>
<li>Implement network segmentation to minimize the exposure of MAXHUB Pivot client application instances to potential attackers, as per CISA&rsquo;s recommended practices.</li>
<li>Deploy the Sigma rule &ldquo;Detect MAXHUB Pivot Client Application Hardcoded AES Key Usage&rdquo; to detect potential exploitation attempts by monitoring for suspicious decryption activities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-6411</category><category>maxhub</category><category>pivot</category><category>broken-crypto</category><category>dos</category></item></channel></rss>