InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
Summary |
|
|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 - Third Party Advisory, US Government Resource |
07 Nov 2023, 04:07
Type | Values Removed | Values Added |
---|---|---|
Summary | InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform. |
Information
Published : 2023-01-12 23:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22601
Mitre link : CVE-2023-22601
CVE.ORG link : CVE-2023-22601
JSON object : View
Products Affected
inhandnetworks
- inrouter302_firmware
- inrouter302
- inrouter615-s
- inrouter615-s_firmware
CWE
CWE-330
Use of Insufficiently Random Values