Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-2626
HistoryJul 25, 2023 - 6:15 p.m.

Authentication flaw

2023-07-2518:15:00
PRIOn knowledge base
www.prio-n.com
3
authentication bypass
openthread
border router
vulnerability
radio frames
ip packets
lan
attacker
ipv6 packets
nat firewall
automatic update
nvd

9.2 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.
This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.

9.2 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

Related for PRION:CVE-2023-2626