First published: Thu Jan 12 2023(Updated: )
InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
InHand Networks InRouter 302 | ||
InHand Networks InRouter 615 | ||
Inhand Networks InRouter302 Firmware | <3.5.56 | |
Inhandnetworks Inrouter302 Firmware | ||
Inhand Networks InRouter 615-S Firmware | <2.3.0.r5542 | |
InHand Networks InRouter 615-S |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22601 is classified under CWE-330: Use of Insufficiently Random Values, which indicates a significant security risk due to predictable MQTT ClientID parameters.
To mitigate CVE-2023-22601, upgrade the InRouter 302 device firmware to version IR302 V3.5.56 or the InRouter 615 firmware to version InRouter6XX-S-V2.3.0.r5542 or later.
CVE-2023-22601 affects InHand Networks InRouter 302 and InRouter 615 devices running firmware versions prior to IR302 V3.5.56 and InRouter6XX-S-V2.3.0.r5542 respectively.
An attacker exploiting CVE-2023-22601 could potentially calculate MQTT ClientID parameters, allowing unauthorized access to the device.
Yes, CVE-2023-22601 can be exploited remotely by an unauthorized user, making it a critical concern for network security.