CVE-2023-22601
Published Jan 12, 2023
Last updated a year ago
Overview
- Description
- InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
- Severity
- HIGH
Weaknesses
- ics-cert@hq.dhs.gov
- CWE-330
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:inhandnetworks:inrouter302_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61C63AA2-2DB5-4E01-9C62-7F78EC298C3F", "versionEndExcluding": "3.5.56" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:inhandnetworks:inrouter302:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B361EE15-6BF4-4D50-AD36-5AC31A101F2E" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:inhandnetworks:inrouter615-s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CC78CBF-AC9D-4581-95DE-CE869505C479", "versionEndExcluding": "2.3.0.r5542" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:inhandnetworks:inrouter615-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "88C88156-94C3-4EFE-9AAB-A9E2BA114ABC" } ], "operator": "OR" } ], "operator": "AND" } ]