CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
56.9%
InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values.Β TheyΒ do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform.
Vendor | Product | Version | CPE |
---|---|---|---|
inhandnetworks | inrouter302_firmware | * | cpe:2.3:o:inhandnetworks:inrouter302_firmware:*:*:*:*:*:*:*:* |
inhandnetworks | inrouter302 | - | cpe:2.3:h:inhandnetworks:inrouter302:-:*:*:*:*:*:*:* |
inhandnetworks | inrouter615-s_firmware | * | cpe:2.3:o:inhandnetworks:inrouter615-s_firmware:*:*:*:*:*:*:*:* |
inhandnetworks | inrouter615-s | - | cpe:2.3:h:inhandnetworks:inrouter615-s:-:*:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"product": "InRouter 302",
"vendor": "InHand Networks",
"versions": [
{
"lessThan": "IR302 V3.5.56",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "InRouter 615",
"vendor": "InHand Networks",
"versions": [
{
"lessThan": "InRouter6XX-S-V2.3.0.r5542",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
]