DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection.
An attacker can exploit this vulnerability by injecting, at the right times, spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information.
This issue affects DroneScout ds230 in default configuration from firmware version 20211210-1627 through 20230329-1042.
References
Link | Resource |
---|---|
https://download.bluemark.io/dronescout/firmware/history.txt | Release Notes |
https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-29156/ | Third Party Advisory |
https://download.bluemark.io/dronescout/firmware/history.txt | Release Notes |
https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-29156/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://download.bluemark.io/dronescout/firmware/history.txt - Release Notes | |
References | () https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-29156/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
30 Sep 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection. An attacker can exploit this vulnerability by injecting, at the right times, spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information. This issue affects DroneScout ds230 in default configuration from firmware version 20211210-1627 through 20230329-1042. | |
CWE | CWE-223 |
20 Jul 2023, 02:11
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:h:bluemark:dronescout_ds230:-:*:*:*:*:*:*:* cpe:2.3:o:bluemark:dronescout_ds230_firmware:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
First Time |
Bluemark dronescout Ds230 Firmware
Bluemark dronescout Ds230 Bluemark |
|
References | (MISC) https://download.bluemark.io/dronescout/firmware/history.txt - Release Notes | |
References | (MISC) https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-29156/ - Third Party Advisory |
11 Jul 2023, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-11 09:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-29156
Mitre link : CVE-2023-29156
CVE.ORG link : CVE-2023-29156
JSON object : View
Products Affected
bluemark
- dronescout_ds230_firmware
- dronescout_ds230
CWE