Search criteria
9 vulnerabilities found for nest_wifi_point_firmware by google
FKIE_CVE-2024-22013
Vulnerability from fkie_nvd - Published: 2024-09-16 20:15 - Updated: 2025-07-24 16:06
Severity ?
Summary
U-Boot environment is read from unauthenticated partition.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| nest_wifi_pro_firmware | 3.73.424613 | ||
| nest_wifi_pro | - | ||
| nest_wifi_point_firmware | 3.73.424613 | ||
| nest_wifi_point | - | ||
| nest_wifi_router_firmware | 3.73.424613 | ||
| nest_wifi_router | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_wifi_pro_firmware:3.73.424613:*:*:*:*:*:*:*",
"matchCriteriaId": "61DA4638-EE6F-4B88-BC5D-4529D4152BE2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_wifi_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "577F9028-2C7F-4161-8E5F-AA28DFE92AFC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_wifi_point_firmware:3.73.424613:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0E97BB-B4B1-40B8-862E-06AF32343A21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F09454DF-61F2-4AF0-9C0D-56026C1E0F0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_wifi_router_firmware:3.73.424613:*:*:*:*:*:*:*",
"matchCriteriaId": "0E43DC42-3BEF-460E-A49D-A6FD9857CA9A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_wifi_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE37475C-41CA-49C4-AE4E-75B49BDF9232",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "U-Boot environment is read from unauthenticated partition."
},
{
"lang": "es",
"value": "El entorno U-Boot se lee desde una partici\u00f3n no autenticada."
}
],
"id": "CVE-2024-22013",
"lastModified": "2025-07-24T16:06:33.190",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-09-16T20:15:45.743",
"references": [
{
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.google.com/product-documentation/answer/14950962?hl=en\u0026ref_topic=12974021\u0026sjid=9595902703262170957-NA#zippy=%2Cwifi"
}
],
"sourceIdentifier": "dsap-vuln-management@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2024-22004
Vulnerability from fkie_nvd - Published: 2024-04-05 18:15 - Updated: 2025-07-24 18:04
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Summary
Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure memory from the Trusted Application
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| nest_wifi_pro_firmware | 24r1 | ||
| nest_wifi_pro | - | ||
| nest_wifi_point_firmware | 24r1 | ||
| nest_wifi_point | - | ||
| nest_wifi_router_firmware | 24r1 | ||
| nest_wifi_router | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_wifi_pro_firmware:24r1:*:*:*:*:*:*:*",
"matchCriteriaId": "79999C17-9D8E-4D29-A84A-913AAA0333DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_wifi_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "577F9028-2C7F-4161-8E5F-AA28DFE92AFC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_wifi_point_firmware:24r1:*:*:*:*:*:*:*",
"matchCriteriaId": "53F40354-DCD0-4786-B5F0-FE99FD8DB60B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F09454DF-61F2-4AF0-9C0D-56026C1E0F0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_wifi_router_firmware:24r1:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE7082C-88A2-45CC-A1CF-93631BC2318F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_wifi_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE37475C-41CA-49C4-AE4E-75B49BDF9232",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure\u00a0memory from the Trusted Application\n"
},
{
"lang": "es",
"value": "Debido a la longitud de la verificaci\u00f3n, un atacante con acceso privilegiado a un sistema operativo Linux no seguro puede desencadenar una vulnerabilidad y filtrar la memoria segura de la aplicaci\u00f3n de confianza."
}
],
"id": "CVE-2024-22004",
"lastModified": "2025-07-24T18:04:51.513",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "dsap-vuln-management@google.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-04-05T18:15:09.100",
"references": [
{
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.google.com/product-documentation/answer/14580222?hl=en\u0026ref_topic=12974021\u0026sjid=10751611047462550096-NA"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.google.com/product-documentation/answer/14580222?hl=en\u0026ref_topic=12974021\u0026sjid=10751611047462550096-NA"
}
],
"sourceIdentifier": "dsap-vuln-management@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "dsap-vuln-management@google.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-2626
Vulnerability from fkie_nvd - Published: 2023-07-25 18:15 - Updated: 2024-11-21 07:58
Severity ?
7.5 (High) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.
This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| nest_hub_max_firmware | * | ||
| nest_hub_max | - | ||
| nest_hub_firmware | * | ||
| nest_hub | - | ||
| wifi_firmware | * | ||
| wifi | - | ||
| nest_wifi_point_firmware | * | ||
| nest_wifi_point | - | ||
| nest_wifi_6e_firmware | * | ||
| nest_wifi_6e | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_hub_max_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE38EF3-8D1A-4A25-84AA-3FA7CD3A4430",
"versionEndExcluding": "10.20221207.2.120",
"versionStartIncluding": "10.20221207.2.109",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39B8859A-A8C1-4687-B092-12DB062328E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_hub_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DD08397-FCC3-4A40-9099-D44B3FAA86D9",
"versionEndExcluding": "10.20221207.2.100042",
"versionStartIncluding": "10.20221207.2.100038",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAE3D16-7C2D-4F04-B835-E8840845F6B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:wifi_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8416D0A-D67B-45F9-951E-8B2E8E457E37",
"versionEndExcluding": "14150.882.9",
"versionStartIncluding": "14150.881.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70A24C3F-07E5-4C50-BA19-8E463FE5B9D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_wifi_point_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E08A6BD-3811-4944-B701-A09496DD5E45",
"versionEndExcluding": "1.56.368671",
"versionStartIncluding": "1.56.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F09454DF-61F2-4AF0-9C0D-56026C1E0F0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_wifi_6e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA5B6F80-87EA-43FC-9A59-E849212A9964",
"versionEndExcluding": "1.63.355999",
"versionStartIncluding": "1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAFE1936-564C-496A-AAE1-E839DAB1A6A1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\u00a0This issue allows unauthenticated nodes to craft radio frames using \u201cKey ID Mode 2\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\n This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range."
}
],
"id": "CVE-2023-2626",
"lastModified": "2024-11-21T07:58:57.490",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9,
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-07-25T18:15:10.690",
"references": [
{
"source": "cve-coordination@google.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi"
}
],
"sourceIdentifier": "cve-coordination@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2024-22013 (GCVE-0-2024-22013)
Vulnerability from cvelistv5 – Published: 2024-09-16 19:52 – Updated: 2024-11-06 21:06
VLAI?
Summary
U-Boot environment is read from unauthenticated partition.
Severity ?
5.3 (Medium)
CWE
- Elevation of privilege
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Nest Wifi Pro |
Affected:
3.73.424613
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-22013",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-17T18:07:50.245315Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T21:06:31.169Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Nest Wifi Pro",
"vendor": "Google",
"versions": [
{
"status": "affected",
"version": "3.73.424613"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eU-Boot environment is read from unauthenticated partition.\u003c/p\u003e"
}
],
"value": "U-Boot environment is read from unauthenticated partition."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of privilege",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-16T19:52:33.764Z",
"orgId": "83238938-5644-45f0-9007-c0392bcf6222",
"shortName": "Google_Devices"
},
"references": [
{
"url": "https://support.google.com/product-documentation/answer/14950962?hl=en\u0026ref_topic=12974021\u0026sjid=9595902703262170957-NA#zippy=%2Cwifi"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "83238938-5644-45f0-9007-c0392bcf6222",
"assignerShortName": "Google_Devices",
"cveId": "CVE-2024-22013",
"datePublished": "2024-09-16T19:52:33.764Z",
"dateReserved": "2024-01-03T21:00:57.456Z",
"dateUpdated": "2024-11-06T21:06:31.169Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-22004 (GCVE-0-2024-22004)
Vulnerability from cvelistv5 – Published: 2024-04-05 18:03 – Updated: 2024-08-01 22:35
VLAI?
Title
Unchecked length in Trusted Application on Google Nest Wifi Pro, leading to out of bounds read
Summary
Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure memory from the Trusted Application
Severity ?
10 (Critical)
CWE
- CWE-125 - Out-of-bounds Read
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Nest Wifi Pro |
Affected:
v11
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:google:nest_wifi_pro_firmware:11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_wifi_pro_firmware",
"vendor": "google",
"versions": [
{
"status": "affected",
"version": "11"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22004",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-29T15:53:35.353686Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-29T15:55:01.992Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:35:34.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.google.com/product-documentation/answer/14580222?hl=en\u0026ref_topic=12974021\u0026sjid=10751611047462550096-NA"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Nest Wifi Pro",
"vendor": "Google",
"versions": [
{
"status": "affected",
"version": "v11"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDue to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ememory from the Trusted Application\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure\u00a0memory from the Trusted Application\n"
}
],
"impacts": [
{
"capecId": "CAPEC-456",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-456 Infected Memory"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-05T18:03:23.151Z",
"orgId": "83238938-5644-45f0-9007-c0392bcf6222",
"shortName": "Google_Devices"
},
"references": [
{
"url": "https://support.google.com/product-documentation/answer/14580222?hl=en\u0026ref_topic=12974021\u0026sjid=10751611047462550096-NA"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Unchecked length in Trusted Application on Google Nest Wifi Pro, leading to out of bounds read",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "83238938-5644-45f0-9007-c0392bcf6222",
"assignerShortName": "Google_Devices",
"cveId": "CVE-2024-22004",
"datePublished": "2024-04-05T18:03:23.151Z",
"dateReserved": "2024-01-03T21:00:57.455Z",
"dateUpdated": "2024-08-01T22:35:34.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-2626 (GCVE-0-2023-2626)
Vulnerability from cvelistv5 – Published: 2023-07-25 17:07 – Updated: 2024-08-02 06:26
VLAI?
Title
Authentication Bypass in OpenThread Boarder Router devices
Summary
There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.
This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.
Severity ?
7.5 (High)
CWE
- CWE-287 - Improper Authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Nest Hub Max |
Affected:
10.20221207.2.109 , < 10.20221207.2.120
(custom)
|
|||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Valentin Leon
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_hub",
"vendor": "google",
"versions": [
{
"lessThan": "10.20221207.2.100042",
"status": "affected",
"version": "10.20221207.2.100038",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_wifi_6e",
"vendor": "google",
"versions": [
{
"lessThan": "1.63.355999",
"status": "affected",
"version": "1.59",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "wifi",
"vendor": "google",
"versions": [
{
"lessThan": "14150.882.9",
"status": "affected",
"version": "14150.881.7",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_wifi_point",
"vendor": "google",
"versions": [
{
"lessThan": "1.56.368671",
"status": "affected",
"version": "1.56.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_hub_max",
"vendor": "google",
"versions": [
{
"lessThan": "10.20221207.2.120",
"status": "affected",
"version": "10.20221207.2.109",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2626",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-21T13:12:27.308613Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:16:51.298Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:26:09.825Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Nest Hub Max",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.120",
"status": "affected",
"version": "10.20221207.2.109",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Hub (2nd. gen) w/ Sleep Tracking",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.100042",
"status": "affected",
"version": "10.20221207.2.100038",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Wifi 6E",
"vendor": "Google",
"versions": [
{
"lessThan": "1.63.355999",
"status": "affected",
"version": "1.59",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Google Wifi (next gen)",
"vendor": "Google",
"versions": [
{
"lessThan": "14150.882.9",
"status": "affected",
"version": "14150.881.7",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Wifi Point",
"vendor": "Google",
"versions": [
{
"lessThan": "1.56.368671",
"status": "affected",
"version": "1.56.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Hub Max",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.120",
"status": "affected",
"version": "10.20221207.2.109",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Hub (2nd. gen) w/ Sleep Tracking",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.100042",
"status": "affected",
"version": "10.20221207.2.100038",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Valentin Leon"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003ch3\u003eThere exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\u0026nbsp;This issue allows unauthenticated nodes to craft radio frames using \u201cKey ID Mode 2\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\u003cbr\u003e This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.\u003cbr\u003e\u003c/h3\u003e"
}
],
"value": "There exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\u00a0This issue allows unauthenticated nodes to craft radio frames using \u201cKey ID Mode 2\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\n This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range."
}
],
"impacts": [
{
"capecId": "CAPEC-115",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-115 Authentication Bypass"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287 Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-21T03:42:27.328Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"url": "https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authentication Bypass in OpenThread Boarder Router devices",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2023-2626",
"datePublished": "2023-07-25T17:07:02.960Z",
"dateReserved": "2023-05-10T11:35:38.314Z",
"dateUpdated": "2024-08-02T06:26:09.825Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-22013 (GCVE-0-2024-22013)
Vulnerability from nvd – Published: 2024-09-16 19:52 – Updated: 2024-11-06 21:06
VLAI?
Summary
U-Boot environment is read from unauthenticated partition.
Severity ?
5.3 (Medium)
CWE
- Elevation of privilege
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Nest Wifi Pro |
Affected:
3.73.424613
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-22013",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-17T18:07:50.245315Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T21:06:31.169Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Nest Wifi Pro",
"vendor": "Google",
"versions": [
{
"status": "affected",
"version": "3.73.424613"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eU-Boot environment is read from unauthenticated partition.\u003c/p\u003e"
}
],
"value": "U-Boot environment is read from unauthenticated partition."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of privilege",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-16T19:52:33.764Z",
"orgId": "83238938-5644-45f0-9007-c0392bcf6222",
"shortName": "Google_Devices"
},
"references": [
{
"url": "https://support.google.com/product-documentation/answer/14950962?hl=en\u0026ref_topic=12974021\u0026sjid=9595902703262170957-NA#zippy=%2Cwifi"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "83238938-5644-45f0-9007-c0392bcf6222",
"assignerShortName": "Google_Devices",
"cveId": "CVE-2024-22013",
"datePublished": "2024-09-16T19:52:33.764Z",
"dateReserved": "2024-01-03T21:00:57.456Z",
"dateUpdated": "2024-11-06T21:06:31.169Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-22004 (GCVE-0-2024-22004)
Vulnerability from nvd – Published: 2024-04-05 18:03 – Updated: 2024-08-01 22:35
VLAI?
Title
Unchecked length in Trusted Application on Google Nest Wifi Pro, leading to out of bounds read
Summary
Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure memory from the Trusted Application
Severity ?
10 (Critical)
CWE
- CWE-125 - Out-of-bounds Read
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Nest Wifi Pro |
Affected:
v11
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:google:nest_wifi_pro_firmware:11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_wifi_pro_firmware",
"vendor": "google",
"versions": [
{
"status": "affected",
"version": "11"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22004",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-29T15:53:35.353686Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-29T15:55:01.992Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:35:34.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.google.com/product-documentation/answer/14580222?hl=en\u0026ref_topic=12974021\u0026sjid=10751611047462550096-NA"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Nest Wifi Pro",
"vendor": "Google",
"versions": [
{
"status": "affected",
"version": "v11"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDue to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ememory from the Trusted Application\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure\u00a0memory from the Trusted Application\n"
}
],
"impacts": [
{
"capecId": "CAPEC-456",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-456 Infected Memory"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-05T18:03:23.151Z",
"orgId": "83238938-5644-45f0-9007-c0392bcf6222",
"shortName": "Google_Devices"
},
"references": [
{
"url": "https://support.google.com/product-documentation/answer/14580222?hl=en\u0026ref_topic=12974021\u0026sjid=10751611047462550096-NA"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Unchecked length in Trusted Application on Google Nest Wifi Pro, leading to out of bounds read",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "83238938-5644-45f0-9007-c0392bcf6222",
"assignerShortName": "Google_Devices",
"cveId": "CVE-2024-22004",
"datePublished": "2024-04-05T18:03:23.151Z",
"dateReserved": "2024-01-03T21:00:57.455Z",
"dateUpdated": "2024-08-01T22:35:34.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-2626 (GCVE-0-2023-2626)
Vulnerability from nvd – Published: 2023-07-25 17:07 – Updated: 2024-08-02 06:26
VLAI?
Title
Authentication Bypass in OpenThread Boarder Router devices
Summary
There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.
This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.
Severity ?
7.5 (High)
CWE
- CWE-287 - Improper Authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Nest Hub Max |
Affected:
10.20221207.2.109 , < 10.20221207.2.120
(custom)
|
|||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Valentin Leon
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_hub",
"vendor": "google",
"versions": [
{
"lessThan": "10.20221207.2.100042",
"status": "affected",
"version": "10.20221207.2.100038",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_wifi_6e",
"vendor": "google",
"versions": [
{
"lessThan": "1.63.355999",
"status": "affected",
"version": "1.59",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "wifi",
"vendor": "google",
"versions": [
{
"lessThan": "14150.882.9",
"status": "affected",
"version": "14150.881.7",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_wifi_point",
"vendor": "google",
"versions": [
{
"lessThan": "1.56.368671",
"status": "affected",
"version": "1.56.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_hub_max",
"vendor": "google",
"versions": [
{
"lessThan": "10.20221207.2.120",
"status": "affected",
"version": "10.20221207.2.109",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2626",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-21T13:12:27.308613Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:16:51.298Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:26:09.825Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Nest Hub Max",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.120",
"status": "affected",
"version": "10.20221207.2.109",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Hub (2nd. gen) w/ Sleep Tracking",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.100042",
"status": "affected",
"version": "10.20221207.2.100038",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Wifi 6E",
"vendor": "Google",
"versions": [
{
"lessThan": "1.63.355999",
"status": "affected",
"version": "1.59",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Google Wifi (next gen)",
"vendor": "Google",
"versions": [
{
"lessThan": "14150.882.9",
"status": "affected",
"version": "14150.881.7",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Wifi Point",
"vendor": "Google",
"versions": [
{
"lessThan": "1.56.368671",
"status": "affected",
"version": "1.56.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Hub Max",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.120",
"status": "affected",
"version": "10.20221207.2.109",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Hub (2nd. gen) w/ Sleep Tracking",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.100042",
"status": "affected",
"version": "10.20221207.2.100038",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Valentin Leon"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003ch3\u003eThere exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\u0026nbsp;This issue allows unauthenticated nodes to craft radio frames using \u201cKey ID Mode 2\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\u003cbr\u003e This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.\u003cbr\u003e\u003c/h3\u003e"
}
],
"value": "There exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\u00a0This issue allows unauthenticated nodes to craft radio frames using \u201cKey ID Mode 2\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\n This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range."
}
],
"impacts": [
{
"capecId": "CAPEC-115",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-115 Authentication Bypass"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287 Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-21T03:42:27.328Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"url": "https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authentication Bypass in OpenThread Boarder Router devices",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2023-2626",
"datePublished": "2023-07-25T17:07:02.960Z",
"dateReserved": "2023-05-10T11:35:38.314Z",
"dateUpdated": "2024-08-02T06:26:09.825Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}