CVE-2023-2626

Severity
8.8HIGH
EPSS
0.0%
top 99.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 25
Latest updateMar 19

Description

There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network. This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentic

CVSS vector

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages10 packages

CVEListV5google/nest_hub_max10.20221207.2.10910.20221207.2.120
CVEListV5google/nest_wifi_6e1.591.63.355999
NVDgoogle/wifi_firmware14150.881.714150.882.9
CVEListV5google/nest_wifi_point1.56.11.56.368671
NVDgoogle/nest_hub_firmware10.20221207.2.10003810.20221207.2.100042

🔴Vulnerability Details

1
CVEList
Authentication Bypass in OpenThread Boarder Router devices2023-07-25

📋Vendor Advisories

1
Chrome
Stable Channel Update for Desktop: CVE-2024-26262024-03-19