CVE-2023-22597
Published Jan 12, 2023
Last updated a year ago
Overview
- Description
- InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-319: Cleartext Transmission of Sensitive Information. They use an unsecured channel to communicate with the cloud platform by default. An unauthorized user could intercept this communication and steal sensitive information such as configuration information and MQTT credentials; this could allow MQTT command injection.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Weaknesses
- ics-cert@hq.dhs.gov
- CWE-319
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:inhandnetworks:inrouter302_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61C63AA2-2DB5-4E01-9C62-7F78EC298C3F", "versionEndExcluding": "3.5.56" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:inhandnetworks:inrouter302:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B361EE15-6BF4-4D50-AD36-5AC31A101F2E" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:inhandnetworks:inrouter615-s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CC78CBF-AC9D-4581-95DE-CE869505C479", "versionEndExcluding": "2.3.0.r5542" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:inhandnetworks:inrouter615-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "88C88156-94C3-4EFE-9AAB-A9E2BA114ABC" } ], "operator": "OR" } ], "operator": "AND" } ]