InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 |
![]() ![]() |
History
Thu, 16 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T22:02:14.602Z
Reserved: 2023-01-03T19:55:20.124Z
Link: CVE-2023-22601

Updated: 2024-08-02T10:13:49.364Z

Status : Modified
Published: 2023-01-12T23:15:10.527
Modified: 2024-11-21T07:45:02.587
Link: CVE-2023-22601

No data.