Lucene search

K
cvelistGoogleCVELIST:CVE-2023-2626
HistoryJul 25, 2023 - 5:07 p.m.

CVE-2023-2626 Authentication Bypass in OpenThread Boarder Router devices

2023-07-2517:07:02
CWE-287
Google
www.cve.org
5
openthread
authentication bypass
border router
vulnerability
ipv6
network mitigation
automatic update

CVSS3

7.5

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.001

Percentile

17.0%

There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.
This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Nest Hub Max",
    "vendor": "Google",
    "versions": [
      {
        "lessThan": "10.20221207.2.120",
        "status": "affected",
        "version": "10.20221207.2.109",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Nest Hub (2nd. gen) w/ Sleep Tracking",
    "vendor": "Google",
    "versions": [
      {
        "lessThan": "10.20221207.2.100042",
        "status": "affected",
        "version": "10.20221207.2.100038",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Nest Wifi 6E",
    "vendor": "Google",
    "versions": [
      {
        "lessThan": "1.63.355999",
        "status": "affected",
        "version": "1.59",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Google Wifi (next gen)",
    "vendor": "Google",
    "versions": [
      {
        "lessThan": "14150.882.9",
        "status": "affected",
        "version": "14150.881.7",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Nest Wifi Point",
    "vendor": "Google",
    "versions": [
      {
        "lessThan": "1.56.368671",
        "status": "affected",
        "version": "1.56.1",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Nest Hub Max",
    "vendor": "Google",
    "versions": [
      {
        "lessThan": "10.20221207.2.120",
        "status": "affected",
        "version": "10.20221207.2.109",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Nest Hub (2nd. gen) w/ Sleep Tracking",
    "vendor": "Google",
    "versions": [
      {
        "lessThan": "10.20221207.2.100042",
        "status": "affected",
        "version": "10.20221207.2.100038",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.001

Percentile

17.0%

Related for CVELIST:CVE-2023-2626