CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
56.9%
InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values.Β TheyΒ do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform.
Vendor | Product | Version | CPE |
---|---|---|---|
inhandnetworks | inrouter302_firmware | * | cpe:2.3:o:inhandnetworks:inrouter302_firmware:*:*:*:*:*:*:*:* |
inhandnetworks | inrouter302 | - | cpe:2.3:h:inhandnetworks:inrouter302:-:*:*:*:*:*:*:* |
inhandnetworks | inrouter615-s_firmware | * | cpe:2.3:o:inhandnetworks:inrouter615-s_firmware:*:*:*:*:*:*:*:* |
inhandnetworks | inrouter615-s | - | cpe:2.3:h:inhandnetworks:inrouter615-s:-:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
56.9%