CVE-2023-22601

InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:inhandnetworks:inrouter302_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:inrouter302:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inhandnetworks:inrouter615-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:inrouter615-s:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:45

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.6
v2 : unknown
v3 : 10.0
Summary
  • (es) InHand Networks InRouter 302, anterior a la versión IR302 V3.5.56, e InRouter 615, anterior a la versión InRouter6XX-S-V2.3.0.r5542, contienen la vulnerabilidad CWE-330: uso de valores insuficientemente aleatorios. No aleatorizan adecuadamente los parámetros ClientID de MQTT. Un usuario no autorizado podría calcular este parámetro y utilizarlo para recopilar información adicional sobre otros dispositivos InHand administrados en la misma plataforma en la nube.
References () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 - Third Party Advisory, US Government Resource

07 Nov 2023, 04:07

Type Values Removed Values Added
Summary InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform. InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform.

Information

Published : 2023-01-12 23:15

Updated : 2024-11-21 07:45


NVD link : CVE-2023-22601

Mitre link : CVE-2023-22601

CVE.ORG link : CVE-2023-22601


JSON object : View

Products Affected

inhandnetworks

  • inrouter302_firmware
  • inrouter302
  • inrouter615-s
  • inrouter615-s_firmware
CWE
CWE-330

Use of Insufficiently Random Values