-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stems from the TLS configuration created in newTLSConfig() which explicitly sets InsecureSkipVerify:true. This configuration is used by the Connect() method when establishing MQTT connections. The commit diff shows the vulnerability was fixed by changing this value to false. The Go vulnerability report (GO-2021-0083) specifically identifies the Connect method as the affected entry point, while the root cause is in the TLS configuration construction.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/hybridgroup/gobot | go | < 1.12.1-0.20190521122906-c1aa4f867846 | 1.12.1-0.20190521122906-c1aa4f867846 |