8.8
CWE
287
Advisory Published
Updated

CVE-2023-2626: Authentication Bypass in OpenThread Boarder Router devices

First published: Tue Jul 25 2023(Updated: )

There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network. This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.

Credit: cve-coordination@google.com cve-coordination@google.com

Affected SoftwareAffected VersionHow to fix
Google Nest Hub Max Firmware>=10.20221207.2.109<10.20221207.2.120
Google Nest Hub Max
Google Nest Hub Firmware>=10.20221207.2.100038<10.20221207.2.100042
Google Nest Hub
Google Wifi Firmware>=14150.881.7<14150.882.9
Google Wifi
Google Nest Wifi Point Firmware>=1.56.1<1.56.368671
Google Nest Wifi Point
Google Nest Wifi 6e Firmware>=1.59<1.63.355999
Google Nest Wifi 6e
All of
Google Nest Hub Max
Google Nest Hub Max Firmware>=10.20221207.2.109<10.20221207.2.120
All of
Google Nest Hub
Google Nest Hub Firmware>=10.20221207.2.100038<10.20221207.2.100042
All of
Google Wifi
Google Wifi Firmware>=14150.881.7<14150.882.9
All of
Google Nest Wifi Point
Google Nest Wifi Point Firmware>=1.56.1<1.56.368671
All of
Google Nest Wifi 6e
Google Nest Wifi 6e Firmware>=1.59<1.63.355999

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-2626?

    CVE-2023-2626 has a severity rating of 8.8 (high).

  • Which devices are affected by CVE-2023-2626?

    OpenThread border router devices and Google Nest Hub Max Firmware, Google Nest Hub Firmware, Google Wifi Firmware, Google Nest Wifi Point Firmware, and Google Nest Wifi 6e Firmware are affected by CVE-2023-2626.

  • How does CVE-2023-2626 work?

    CVE-2023-2626 allows unauthenticated nodes to use a special mode with a static encryption key to bypass security checks, resulting in arbitrary IP packets.

  • Is Google Nest Hub Max vulnerable to CVE-2023-2626?

    Google Nest Hub Max is vulnerable to CVE-2023-2626 if it is running a firmware version between 10.20221207.2.109 and 10.20221207.2.120.

  • How can I fix CVE-2023-2626?

    To fix CVE-2023-2626, it is recommended to update the firmware of the affected devices to a version that is not vulnerable.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203