Lucene search

K
cve[email protected]CVE-2023-46892
HistoryJan 23, 2024 - 9:15 p.m.

CVE-2023-46892

2024-01-2321:15:08
CWE-294
web.nvd.nist.gov
10
cve-2023-46892
meross msh30q
4.5.23
replay attacks
communication protocol
unauthorized commands

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.7%

The radio frequency communication protocol being used by Meross MSH30Q 4.5.23 is vulnerable to replay attacks, allowing attackers to record and replay previously captured communication to execute unauthorized commands or actions (e.g., thermostat’s temperature).

Affected configurations

NVD
Node
merossmsh30qMatch-
AND
merossmsh30q_firmwareMatch4.5.23

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.7%

Related for CVE-2023-46892