CVE-2023-2626

There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network. This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:google:nest_hub_max_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:google:nest_hub_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:google:wifi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:google:nest_wifi_point_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:google:nest_wifi_6e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 7.5
References () https://support.google.com/product-documentation/answer/13588832?hl=en&ref_topic=12974021&sjid=7833436865896465963-NA#zippy=%2Cnest-wifi - Vendor Advisory () https://support.google.com/product-documentation/answer/13588832?hl=en&ref_topic=12974021&sjid=7833436865896465963-NA#zippy=%2Cnest-wifi - Vendor Advisory

21 May 2024, 04:15

Type Values Removed Values Added
Summary (en) There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network. This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range. (en) There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network. This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.

02 Aug 2023, 15:48

Type Values Removed Values Added
CWE CWE-287
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References (MISC) https://support.google.com/product-documentation/answer/13588832?hl=en&ref_topic=12974021&sjid=7833436865896465963-NA#zippy=%2Cnest-wifi - (MISC) https://support.google.com/product-documentation/answer/13588832?hl=en&ref_topic=12974021&sjid=7833436865896465963-NA#zippy=%2Cnest-wifi - Vendor Advisory
CPE cpe:2.3:o:google:nest_hub_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:google:wifi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:*
cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:*
cpe:2.3:o:google:nest_wifi_point_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:google:nest_wifi_6e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:*
cpe:2.3:o:google:nest_hub_max_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*
cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:*

25 Jul 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-25 18:15

Updated : 2024-11-21 07:58


NVD link : CVE-2023-2626

Mitre link : CVE-2023-2626

CVE.ORG link : CVE-2023-2626


JSON object : View

Products Affected

google

  • wifi_firmware
  • nest_hub_max_firmware
  • wifi
  • nest_wifi_6e
  • nest_hub
  • nest_wifi_point
  • nest_hub_max
  • nest_wifi_6e_firmware
  • nest_wifi_point_firmware
  • nest_hub_firmware
CWE
CWE-287

Improper Authentication