InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-284: Improper Access Control. They allow unauthenticated devices to subscribe to MQTT topics on the same network as the device manager. An unauthorized user who knows of an existing topic name could send and receive messages to and from that topic. This includes the ability to send GET/SET configuration commands, reboot commands, and push firmware updates.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
Summary |
|
07 Nov 2023, 04:07
Type | Values Removed | Values Added |
---|---|---|
Summary | InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-284: Improper Access Control. They allow unauthenticated devices to subscribe to MQTT topics on the same network as the device manager. An unauthorized user who knows of an existing topic name could send and receive messages to and from that topic. This includes the ability to send GET/SET configuration commands, reboot commands, and push firmware updates. |
Information
Published : 2023-01-12 23:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22600
Mitre link : CVE-2023-22600
CVE.ORG link : CVE-2023-22600
JSON object : View
Products Affected
inhandnetworks
- inrouter302_firmware
- inrouter302
- inrouter615-s
- inrouter615-s_firmware
CWE