cve/2023/CVE-2023-2626.md
2024-05-28 08:49:17 +00:00

26 lines
2.0 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2023-2626](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2626)
![](https://img.shields.io/static/v1?label=Product&message=Google%20Wifi%20(next%20gen)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Nest%20Hub%20(2nd.%20gen)%20w%2F%20Sleep%20Tracking&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Nest%20Hub%20Max&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Nest%20Wifi%206E&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Nest%20Wifi%20Point&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.56.1%3C%201.56.368671%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=1.59%3C%201.63.355999%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.20221207.2.100038%3C%2010.20221207.2.100042%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.20221207.2.109%3C%2010.20221207.2.120%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=14150.881.7%3C%2014150.882.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-287%20Improper%20Authentication&color=brighgreen)
### Description
There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network. This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home routers NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Qorvo/QGateway