CVE-2023-22597

InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-319: Cleartext Transmission of Sensitive Information. They use an unsecured channel to communicate with the cloud platform by default. An unauthorized user could intercept this communication and steal sensitive information such as configuration information and MQTT credentials; this could allow MQTT command injection.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:inhandnetworks:inrouter302_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:inrouter302:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inhandnetworks:inrouter615-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:inrouter615-s:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:45

Type Values Removed Values Added
Summary
  • (es) InHand Networks InRouter 302, anterior a la versión IR302 V3.5.56, e InRouter 615, anterior a la versión InRouter6XX-S-V2.3.0.r5542, contienen la vulnerabilidad CWE-319: transmisión de texto plano de información confidencial. Utilizan un canal no seguro para comunicarse con la plataforma en la nube de forma predeterminada. Un usuario no autorizado podría interceptar esta comunicación y robar información confidencial, como información de configuración y credenciales MQTT; esto podría permitir la inyección de comandos MQTT.
CVSS v2 : unknown
v3 : 5.9
v2 : unknown
v3 : 6.5
References () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 - Third Party Advisory, US Government Resource

07 Nov 2023, 04:07

Type Values Removed Values Added
Summary InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-319: Cleartext Transmission of Sensitive Information. They use an unsecured channel to communicate with the cloud platform by default. An unauthorized user could intercept this communication and steal sensitive information such as configuration information and MQTT credentials; this could allow MQTT command injection. InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-319: Cleartext Transmission of Sensitive Information. They use an unsecured channel to communicate with the cloud platform by default. An unauthorized user could intercept this communication and steal sensitive information such as configuration information and MQTT credentials; this could allow MQTT command injection.

Information

Published : 2023-01-12 23:15

Updated : 2024-11-21 07:45


NVD link : CVE-2023-22597

Mitre link : CVE-2023-22597

CVE.ORG link : CVE-2023-22597


JSON object : View

Products Affected

inhandnetworks

  • inrouter302_firmware
  • inrouter302
  • inrouter615-s
  • inrouter615-s_firmware
CWE
CWE-319

Cleartext Transmission of Sensitive Information