8.2 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
47 packages
- python313Packages.ha-silabs-firmware-client
- ghidra-extensions.ghidra-firmware-utils
- azure-cli-extensions.firmwareanalysis
- ath9k-htc-blobless-firmware-unstable
- python313Packages.virt-firmware
- python312Packages.virt-firmware
- armTrustedFirmwareAllwinnerH6
- armTrustedFirmwareAllwinnerH616
- nitrokey-storage-firmware
- armTrustedFirmwareAllwinner
- ath9k-htc-blobless-firmware
- raspberrypiWirelessFirmware
- nitrokey-trng-rs232-firmware
- armTrustedFirmwareRK3568
- armTrustedFirmwareRK3588
- armTrustedFirmwareRK3399
- armTrustedFirmwareRK3328
- sigrok-firmware-fx2lafw
- nitrokey-start-firmware
- b43Firmware_5_1_138
- facetimehd-firmware
- intel2200BGFirmware
- xow_dongle-firmware
- broadcom-bt-firmware
- uefi-firmware-parser
- nitrokey-pro-firmware
- armTrustedFirmwareQemu
- armTrustedFirmwareS905
- libreelec-dvb-firmware
- armTrustedFirmwareTools
- b43Firmware_6_30_163_46
- nitrokey-fido2-firmware
- rtl8192su-firmware
- system76-firmware
- rtl8761b-firmware
- klipper-firmware
- firmware-updater
- armbian-firmware
- firmware-manager
- zd1211fw
- sof-firmware
- alsa-firmware
- ivsc-firmware
- raspberrypifw
- gnome-firmware
- linux-firmware
- rt5677-firmware
- @LeSuisse dismissed
In Meshtastic, an attacker can spoof licensed amateur flag for a node
Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by abusing the HAM mode which doesn't use encryption. An attacker can, as such, forge a NodeInfo on behalf of a victim node advertising that the HAM mode is enabled. This, in turn, will allow the other nodes on the mesh to accept the new information and overwriting the NodeDB. The other nodes will then only be able to send direct messages to the victim by using the shared channel key instead of the PKC. Additionally, because HAM mode by design doesn't provide any confidentiality or authentication of information, the attacker could potentially also be able to change the Node details, like the full name, short code, etc. To keep the attack persistent, it is enough to regularly resend the forged NodeInfo, in particular right after the victim sends their own. A patch is available in version 2.7.6.834c3c5.
References
- https://github.com/meshtastic/firmware/security/advisories/GHSA-45vg-3f35-7ch2 x_refsource_CONFIRM
- https://github.com/meshtastic/firmware/commit/e5e8683cdba133e726033101586c3235a8678893 x_refsource_MISC
- https://github.com/meshtastic/firmware/security/advisories/GHSA-45vg-3f35-7ch2 x_refsource_CONFIRM
- https://github.com/meshtastic/firmware/commit/e5e8683cdba133e726033101586c3235a8678893 x_refsource_MISC
- https://github.com/meshtastic/firmware/security/advisories/GHSA-45vg-3f35-7ch2 x_refsource_CONFIRM
- https://github.com/meshtastic/firmware/commit/e5e8683cdba133e726033101586c3235a8678893 x_refsource_MISC
- https://github.com/meshtastic/firmware/security/advisories/GHSA-45vg-3f35-7ch2 x_refsource_CONFIRM
- https://github.com/meshtastic/firmware/commit/e5e8683cdba133e726033101586c3235a8678893 x_refsource_MISC
- https://github.com/meshtastic/firmware/commit/e5e8683cdba133e726033101586c3235a8678893 x_refsource_MISC
- https://github.com/meshtastic/firmware/security/advisories/GHSA-45vg-3f35-7ch2 x_refsource_CONFIRM
Affected products
- ==<= 2.6.2