CWE
330
Advisory Published
Updated

CVE-2023-22601

First published: Thu Jan 12 2023(Updated: )

InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
InHand Networks InRouter 302
InHand Networks InRouter 615
Inhand Networks InRouter302 Firmware<3.5.56
Inhandnetworks Inrouter302 Firmware
Inhand Networks InRouter 615-S Firmware<2.3.0.r5542
InHand Networks InRouter 615-S

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2023-22601?

    CVE-2023-22601 is classified under CWE-330: Use of Insufficiently Random Values, which indicates a significant security risk due to predictable MQTT ClientID parameters.

  • How do I fix CVE-2023-22601?

    To mitigate CVE-2023-22601, upgrade the InRouter 302 device firmware to version IR302 V3.5.56 or the InRouter 615 firmware to version InRouter6XX-S-V2.3.0.r5542 or later.

  • What devices are affected by CVE-2023-22601?

    CVE-2023-22601 affects InHand Networks InRouter 302 and InRouter 615 devices running firmware versions prior to IR302 V3.5.56 and InRouter6XX-S-V2.3.0.r5542 respectively.

  • What can an attacker do with CVE-2023-22601?

    An attacker exploiting CVE-2023-22601 could potentially calculate MQTT ClientID parameters, allowing unauthorized access to the device.

  • Is CVE-2023-22601 a remote vulnerability?

    Yes, CVE-2023-22601 can be exploited remotely by an unauthorized user, making it a critical concern for network security.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203