Vulnerabilities (CVE)

Filtered by vendor Google Subscribe
Filtered by product Nest Wifi Point
Total 3 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-22004 1 Google 6 Nest Wifi Point, Nest Wifi Point Firmware, Nest Wifi Pro and 3 more 2025-07-24 N/A 10.0 CRITICAL
Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure memory from the Trusted Application
CVE-2024-22013 1 Google 6 Nest Wifi Point, Nest Wifi Point Firmware, Nest Wifi Pro and 3 more 2025-07-24 N/A 5.3 MEDIUM
U-Boot environment is read from unauthenticated partition.
CVE-2023-2626 1 Google 10 Nest Hub, Nest Hub Firmware, Nest Hub Max and 7 more 2024-11-21 N/A 7.5 HIGH
There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network. This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.