CVE-2023-2626 (GCVE-0-2023-2626)
Vulnerability from cvelistv5 – Published: 2023-07-25 17:07 – Updated: 2024-08-02 06:26
VLAI?
Title
Authentication Bypass in OpenThread Boarder Router devices
Summary
There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.
This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.
Severity ?
7.5 (High)
CWE
- CWE-287 - Improper Authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Nest Hub Max |
Affected:
10.20221207.2.109 , < 10.20221207.2.120
(custom)
|
|||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Valentin Leon
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_hub",
"vendor": "google",
"versions": [
{
"lessThan": "10.20221207.2.100042",
"status": "affected",
"version": "10.20221207.2.100038",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_wifi_6e",
"vendor": "google",
"versions": [
{
"lessThan": "1.63.355999",
"status": "affected",
"version": "1.59",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "wifi",
"vendor": "google",
"versions": [
{
"lessThan": "14150.882.9",
"status": "affected",
"version": "14150.881.7",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_wifi_point",
"vendor": "google",
"versions": [
{
"lessThan": "1.56.368671",
"status": "affected",
"version": "1.56.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nest_hub_max",
"vendor": "google",
"versions": [
{
"lessThan": "10.20221207.2.120",
"status": "affected",
"version": "10.20221207.2.109",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2626",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-21T13:12:27.308613Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:16:51.298Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:26:09.825Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Nest Hub Max",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.120",
"status": "affected",
"version": "10.20221207.2.109",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Hub (2nd. gen) w/ Sleep Tracking",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.100042",
"status": "affected",
"version": "10.20221207.2.100038",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Wifi 6E",
"vendor": "Google",
"versions": [
{
"lessThan": "1.63.355999",
"status": "affected",
"version": "1.59",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Google Wifi (next gen)",
"vendor": "Google",
"versions": [
{
"lessThan": "14150.882.9",
"status": "affected",
"version": "14150.881.7",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Wifi Point",
"vendor": "Google",
"versions": [
{
"lessThan": "1.56.368671",
"status": "affected",
"version": "1.56.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Hub Max",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.120",
"status": "affected",
"version": "10.20221207.2.109",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Nest Hub (2nd. gen) w/ Sleep Tracking",
"vendor": "Google",
"versions": [
{
"lessThan": "10.20221207.2.100042",
"status": "affected",
"version": "10.20221207.2.100038",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Valentin Leon"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003ch3\u003eThere exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\u0026nbsp;This issue allows unauthenticated nodes to craft radio frames using \u201cKey ID Mode 2\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\u003cbr\u003e This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.\u003cbr\u003e\u003c/h3\u003e"
}
],
"value": "There exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\u00a0This issue allows unauthenticated nodes to craft radio frames using \u201cKey ID Mode 2\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\n This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range."
}
],
"impacts": [
{
"capecId": "CAPEC-115",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-115 Authentication Bypass"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287 Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-21T03:42:27.328Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"url": "https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authentication Bypass in OpenThread Boarder Router devices",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2023-2626",
"datePublished": "2023-07-25T17:07:02.960Z",
"dateReserved": "2023-05-10T11:35:38.314Z",
"dateUpdated": "2024-08-02T06:26:09.825Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:nest_hub_max_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.20221207.2.109\", \"versionEndExcluding\": \"10.20221207.2.120\", \"matchCriteriaId\": \"AAE38EF3-8D1A-4A25-84AA-3FA7CD3A4430\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39B8859A-A8C1-4687-B092-12DB062328E6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:nest_hub_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.20221207.2.100038\", \"versionEndExcluding\": \"10.20221207.2.100042\", \"matchCriteriaId\": \"0DD08397-FCC3-4A40-9099-D44B3FAA86D9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAAE3D16-7C2D-4F04-B835-E8840845F6B2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:wifi_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14150.881.7\", \"versionEndExcluding\": \"14150.882.9\", \"matchCriteriaId\": \"C8416D0A-D67B-45F9-951E-8B2E8E457E37\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70A24C3F-07E5-4C50-BA19-8E463FE5B9D8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:nest_wifi_point_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.56.1\", \"versionEndExcluding\": \"1.56.368671\", \"matchCriteriaId\": \"5E08A6BD-3811-4944-B701-A09496DD5E45\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F09454DF-61F2-4AF0-9C0D-56026C1E0F0F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:nest_wifi_6e_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.59\", \"versionEndExcluding\": \"1.63.355999\", \"matchCriteriaId\": \"FA5B6F80-87EA-43FC-9A59-E849212A9964\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAFE1936-564C-496A-AAE1-E839DAB1A6A1\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"There exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\\u00a0This issue allows unauthenticated nodes to craft radio frames using \\u201cKey ID Mode 2\\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\\n This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.\"}]",
"id": "CVE-2023-2626",
"lastModified": "2024-11-21T07:58:57.490",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cve-coordination@google.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2023-07-25T18:15:10.690",
"references": "[{\"url\": \"https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve-coordination@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"cve-coordination@google.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-2626\",\"sourceIdentifier\":\"cve-coordination@google.com\",\"published\":\"2023-07-25T18:15:10.690\",\"lastModified\":\"2024-11-21T07:58:57.490\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\u00a0This issue allows unauthenticated nodes to craft radio frames using \u201cKey ID Mode 2\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\\n This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:nest_hub_max_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.20221207.2.109\",\"versionEndExcluding\":\"10.20221207.2.120\",\"matchCriteriaId\":\"AAE38EF3-8D1A-4A25-84AA-3FA7CD3A4430\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39B8859A-A8C1-4687-B092-12DB062328E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:nest_hub_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.20221207.2.100038\",\"versionEndExcluding\":\"10.20221207.2.100042\",\"matchCriteriaId\":\"0DD08397-FCC3-4A40-9099-D44B3FAA86D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAAE3D16-7C2D-4F04-B835-E8840845F6B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:wifi_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14150.881.7\",\"versionEndExcluding\":\"14150.882.9\",\"matchCriteriaId\":\"C8416D0A-D67B-45F9-951E-8B2E8E457E37\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70A24C3F-07E5-4C50-BA19-8E463FE5B9D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:nest_wifi_point_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.56.1\",\"versionEndExcluding\":\"1.56.368671\",\"matchCriteriaId\":\"5E08A6BD-3811-4944-B701-A09496DD5E45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F09454DF-61F2-4AF0-9C0D-56026C1E0F0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:nest_wifi_6e_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.59\",\"versionEndExcluding\":\"1.63.355999\",\"matchCriteriaId\":\"FA5B6F80-87EA-43FC-9A59-E849212A9964\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAFE1936-564C-496A-AAE1-E839DAB1A6A1\"}]}]}],\"references\":[{\"url\":\"https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T06:26:09.825Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-2626\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-21T13:12:27.308613Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"nest_hub\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.20221207.2.100038\", \"lessThan\": \"10.20221207.2.100042\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"nest_wifi_6e\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.59\", \"lessThan\": \"1.63.355999\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"wifi\", \"versions\": [{\"status\": \"affected\", \"version\": \"14150.881.7\", \"lessThan\": \"14150.882.9\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"nest_wifi_point\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.56.1\", \"lessThan\": \"1.56.368671\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"nest_hub_max\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.20221207.2.109\", \"lessThan\": \"10.20221207.2.120\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-21T13:17:17.357Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"Authentication Bypass in OpenThread Boarder Router devices\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Valentin Leon\"}], \"impacts\": [{\"capecId\": \"CAPEC-115\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-115 Authentication Bypass\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Google\", \"product\": \"Nest Hub Max\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.20221207.2.109\", \"lessThan\": \"10.20221207.2.120\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Google\", \"product\": \"Nest Hub (2nd. gen) w/ Sleep Tracking\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.20221207.2.100038\", \"lessThan\": \"10.20221207.2.100042\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Google\", \"product\": \"Nest Wifi 6E\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.59\", \"lessThan\": \"1.63.355999\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Google\", \"product\": \"Google Wifi (next gen)\", \"versions\": [{\"status\": \"affected\", \"version\": \"14150.881.7\", \"lessThan\": \"14150.882.9\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Google\", \"product\": \"Nest Wifi Point\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.56.1\", \"lessThan\": \"1.56.368671\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Google\", \"product\": \"Nest Hub Max\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.20221207.2.109\", \"lessThan\": \"10.20221207.2.120\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Google\", \"product\": \"Nest Hub (2nd. gen) w/ Sleep Tracking\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.20221207.2.100038\", \"lessThan\": \"10.20221207.2.100042\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://support.google.com/product-documentation/answer/13588832?hl=en\u0026ref_topic=12974021\u0026sjid=7833436865896465963-NA#zippy=%2Cnest-wifi\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"There exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\\u00a0This issue allows unauthenticated nodes to craft radio frames using \\u201cKey ID Mode 2\\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\\n This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003ch3\u003eThere exists an authentication bypass vulnerability in OpenThread border router devices and implementations.\u0026nbsp;This issue allows unauthenticated nodes to craft radio frames using \\u201cKey ID Mode 2\\u201d: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.\u003cbr\u003e This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router\\u2019s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.\u003cbr\u003e\u003c/h3\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-287\", \"description\": \"CWE-287 Improper Authentication\"}]}], \"providerMetadata\": {\"orgId\": \"14ed7db2-1595-443d-9d34-6215bf890778\", \"shortName\": \"Google\", \"dateUpdated\": \"2024-05-21T03:42:27.328Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-2626\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T06:26:09.825Z\", \"dateReserved\": \"2023-05-10T11:35:38.314Z\", \"assignerOrgId\": \"14ed7db2-1595-443d-9d34-6215bf890778\", \"datePublished\": \"2023-07-25T17:07:02.960Z\", \"assignerShortName\": \"Google\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…