CVE-2023-29156

DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection. An attacker can exploit this vulnerability by injecting, at the right times, spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information. This issue affects DroneScout ds230 in default configuration from firmware version 20211210-1627 through 20230329-1042.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:bluemark:dronescout_ds230:-:*:*:*:*:*:*:*
cpe:2.3:o:bluemark:dronescout_ds230_firmware:*:*:*:*:*:*:*:*

History

30 Sep 2024, 10:15

Type Values Removed Values Added
CWE CWE-221 CWE-223
Summary (en) DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection. An attacker can exploit this vulnerability by injecting, at the right times, spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information. This issue affects DroneScout ds230 in default configuration from firmware version 20211210-1627 through 20230329-1042. (en) DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection. An attacker can exploit this vulnerability by injecting, at the right times, spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information. This issue affects DroneScout ds230 in default configuration from firmware version 20211210-1627 through 20230329-1042.

20 Jul 2023, 02:11

Type Values Removed Values Added
CPE cpe:2.3:h:bluemark:dronescout_ds230:-:*:*:*:*:*:*:*
cpe:2.3:o:bluemark:dronescout_ds230_firmware:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
First Time Bluemark dronescout Ds230 Firmware
Bluemark dronescout Ds230
Bluemark
References (MISC) https://download.bluemark.io/dronescout/firmware/history.txt - (MISC) https://download.bluemark.io/dronescout/firmware/history.txt - Release Notes
References (MISC) https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-29156/ - (MISC) https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-29156/ - Third Party Advisory
CWE NVD-CWE-noinfo

11 Jul 2023, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-11 09:15

Updated : 2024-09-30 10:15


NVD link : CVE-2023-29156

Mitre link : CVE-2023-29156

CVE.ORG link : CVE-2023-29156


JSON object : View

Products Affected

bluemark

  • dronescout_ds230
  • dronescout_ds230_firmware
CWE
CWE-223

Omission of Security-relevant Information

NVD-CWE-noinfo