CVE-2023-46892

The radio frequency communication protocol being used by Meross MSH30Q 4.5.23 is vulnerable to replay attacks, allowing attackers to record and replay previously captured communication to execute unauthorized commands or actions (e.g., thermostat's temperature).
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:meross:msh30q_firmware:4.5.23:*:*:*:*:*:*:*
cpe:2.3:h:meross:msh30q:-:*:*:*:*:*:*:*

History

29 Jan 2024, 20:58

Type Values Removed Values Added
CPE cpe:2.3:o:meross:msh30q_firmware:4.5.23:*:*:*:*:*:*:*
cpe:2.3:h:meross:msh30q:-:*:*:*:*:*:*:*
First Time Meross msh30q
Meross msh30q Firmware
Meross
References () https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 - () https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-294

23 Jan 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-23 21:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-46892

Mitre link : CVE-2023-46892

CVE.ORG link : CVE-2023-46892


JSON object : View

Products Affected

meross

  • msh30q
  • msh30q_firmware
CWE
CWE-294

Authentication Bypass by Capture-replay