InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-760: Use of a One-way Hash with a Predictable Salt. They
send MQTT credentials in response to HTTP/HTTPS requests from the cloud platform. These credentials are encoded using a hardcoded string into an MD5 hash. This string could be easily calculated by an unauthorized user who spoofed sending an HTTP/HTTPS request to the devices. This could result in the affected devices being temporarily disconnected from the cloud platform and allow the user to receive MQTT commands with potentially sensitive information.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2023-01-12T22:31:55.394Z
Updated: 2024-08-02T10:13:49.410Z
Reserved: 2023-01-03T19:55:20.124Z
Link: CVE-2023-22599
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-01-12T23:15:10.360
Modified: 2024-11-21T07:45:02.277
Link: CVE-2023-22599
Redhat
No data.