8.8
CVE-2023-2626
- EPSS 0.01%
- Veröffentlicht 25.07.2023 18:15:10
- Zuletzt bearbeitet 21.11.2024 07:58:57
- Quelle cve-coordination@google.com
- Teams Watchlist Login
- Unerledigt Login
There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network. This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Google ≫ Nest Hub Max Firmware Version >= 10.20221207.2.109 < 10.20221207.2.120
Google ≫ Nest Hub Firmware Version >= 10.20221207.2.100038 < 10.20221207.2.100042
Google ≫ Wifi Firmware Version >= 14150.881.7 < 14150.882.9
Google ≫ Nest Wifi Point Firmware Version >= 1.56.1 < 1.56.368671
Google ≫ Nest Wifi 6e Firmware Version >= 1.59 < 1.63.355999
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.01% | 0.012 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cve-coordination@google.com | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.