CVE-2023-29156

DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection. An attacker can exploit this vulnerability by injecting, at the right times, spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information. This issue affects DroneScout ds230 in default configuration from firmware version 20211210-1627 through 20230329-1042.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:bluemark:dronescout_ds230:-:*:*:*:*:*:*:*
cpe:2.3:o:bluemark:dronescout_ds230_firmware:*:*:*:*:*:*:*:*

History

30 Sep 2024, 10:15

Type Values Removed Values Added
Summary (en) DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection. An attacker can exploit this vulnerability by injecting, at the right times, spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information. This issue affects DroneScout ds230 in default configuration from firmware version 20211210-1627 through 20230329-1042. (en) DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection. An attacker can exploit this vulnerability by injecting, at the right times, spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information. This issue affects DroneScout ds230 in default configuration from firmware version 20211210-1627 through 20230329-1042.
CWE CWE-221 CWE-223

20 Jul 2023, 02:11

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
CPE cpe:2.3:o:bluemark:dronescout_ds230_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:bluemark:dronescout_ds230:-:*:*:*:*:*:*:*
References (MISC) https://download.bluemark.io/dronescout/firmware/history.txt - (MISC) https://download.bluemark.io/dronescout/firmware/history.txt - Release Notes
References (MISC) https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-29156/ - (MISC) https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-29156/ - Third Party Advisory
CWE NVD-CWE-noinfo

11 Jul 2023, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-11 09:15

Updated : 2024-09-30 10:15


NVD link : CVE-2023-29156

Mitre link : CVE-2023-29156

CVE.ORG link : CVE-2023-29156


JSON object : View

Products Affected

bluemark

  • dronescout_ds230_firmware
  • dronescout_ds230
CWE
CWE-223

Omission of Security-relevant Information

NVD-CWE-noinfo