Impact
A vulnerability exists in the Enhanced Wi‑Fi Pairing function of DJI Mavic Mini, Air, Spark and Mini SE drones. By capturing and replaying a valid authentication sequence, an attacker can cause the drone to accept the replay and thereby bypass the authentication required for pairing. The vulnerability permits unauthorized local‐network access to the drone’s control interface, potentially allowing control over the device without proper credentials. Only the authentication step is compromised; other local‑level controls remain intact, but the ability to pair without credentials can lead to unauthorized flight or data manipulation.
Affected Systems
Affected products include DJI Air, DJI Mavic Mini, DJI Mini SE, and DJI Spark. Firmware versions up to 01.00.0500 are susceptible. No patch or firmware update is currently available from DJI; the vendor has not responded to the public disclosure.
Risk and Exploitability
The CVSS score of 2.3 indicates low overall severity, and the EPSS score of less than 1 % suggests that the likelihood of exploitation in the wild is very small. However, exploitation requires the attacker to be on the same local network and conduct a capture‑replay of authentication packets, a process that is complex and potentially difficult. The vulnerability is not listed in CISA’s KEV catalog. If an attacker succeeds, they can achieve unauthorized local pairing, which may facilitate further actions such as remote control or data exfiltration, but the attack is limited to the local network scope.
OpenCVE Enrichment