There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.
This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 May 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network. This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range. |
02 Aug 2023, 15:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:google:nest_hub_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:google:wifi_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:* cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:* cpe:2.3:o:google:nest_hub_max_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:google:nest_wifi_point_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:* cpe:2.3:o:google:nest_wifi_6e_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:* cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:* |
|
CWE | CWE-287 | |
References | (MISC) https://support.google.com/product-documentation/answer/13588832?hl=en&ref_topic=12974021&sjid=7833436865896465963-NA#zippy=%2Cnest-wifi - Vendor Advisory | |
First Time |
Google
Google nest Wifi 6e Google nest Hub Max Google nest Hub Google wifi Firmware Google nest Hub Max Firmware Google nest Wifi 6e Firmware Google nest Wifi Point Google wifi Google nest Wifi Point Firmware Google nest Hub Firmware |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
25 Jul 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-25 18:15
Updated : 2024-05-21 04:15
NVD link : CVE-2023-2626
Mitre link : CVE-2023-2626
CVE.ORG link : CVE-2023-2626
JSON object : View
Products Affected
- nest_hub
- nest_hub_firmware
- nest_wifi_6e
- wifi_firmware
- nest_wifi_point
- nest_hub_max_firmware
- nest_hub_max
- nest_wifi_point_firmware
- nest_wifi_6e_firmware
- wifi
CWE
CWE-287
Improper Authentication