First published: Thu Jan 12 2023(Updated: )
InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-319: Cleartext Transmission of Sensitive Information. They use an unsecured channel to communicate with the cloud platform by default. An unauthorized user could intercept this communication and steal sensitive information such as configuration information and MQTT credentials; this could allow MQTT command injection.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
InHand Networks InRouter 302 | ||
InHand Networks InRouter 615 | ||
Inhand Networks InRouter302 Firmware | <3.5.56 | |
Inhandnetworks Inrouter302 Firmware | ||
Inhand Networks InRouter 615-S Firmware | <2.3.0.r5542 | |
InHand Networks InRouter 615-S |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22597 has been classified as a CWE-319 vulnerability, indicating a serious risk due to the cleartext transmission of sensitive information.
To mitigate CVE-2023-22597, upgrade InRouter 302 to version IR302 V3.5.56 or InRouter 615 to version InRouter6XX-S-V2.3.0.r5542 and ensure secure communication channels are configured.
CVE-2023-22597 affects InHand Networks InRouter 302 versions prior to IR302 V3.5.56 and InRouter 615 versions prior to InRouter6XX-S-V2.3.0.r5542.
CVE-2023-22597 potentially exposes sensitive information transmitted in cleartext to unauthorized parties.
Yes, CVE-2023-22597 can be exploited remotely through the unsecured communication channel used by the affected devices.