InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-319: Cleartext Transmission of Sensitive Information. They use an unsecured channel to communicate with the cloud platform by default. An unauthorized user could intercept this communication and steal sensitive information such as configuration information and MQTT credentials; this could allow MQTT command injection. 
                
            References
                    | Link | Resource | 
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 | Third Party Advisory US Government Resource | 
| https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 | Third Party Advisory US Government Resource | 
Configurations
                    History
                    21 Nov 2024, 07:45
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-01-12 23:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22597
Mitre link : CVE-2023-22597
CVE.ORG link : CVE-2023-22597
JSON object : View
Products Affected
                inhandnetworks
- inrouter302
 - inrouter615-s_firmware
 - inrouter302_firmware
 - inrouter615-s
 
CWE
                
                    
                        
                        CWE-319
                        
            Cleartext Transmission of Sensitive Information
