Vulnerability Description
Meross MSH30Q 4.5.23 is vulnerable to Cleartext Transmission of Sensitive Information. During the device setup phase, the MSH30Q creates an unprotected Wi-Fi access point. In this phase, MSH30Q needs to connect to the Internet through a Wi-Fi router. This is why MSH30Q asks for the Wi-Fi network name (SSID) and the Wi-Fi network password. When the user enters the password, the transmission of the Wi-Fi password and name between the MSH30Q and mobile application is observed in the Wi-Fi network. Although the Wi-Fi password is encrypted, a part of the decryption algorithm is public so we complemented the missing parts to decrypt it.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Meross | Msh30Q Firmware | 4.5.23 |
| Meross | Msh30Q | - |
Related Weaknesses (CWE)
References
- https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/prThird Party Advisory
- https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/prThird Party Advisory
FAQ
What is CVE-2023-46889?
CVE-2023-46889 is a vulnerability with a CVSS score of 5.7 (MEDIUM). Meross MSH30Q 4.5.23 is vulnerable to Cleartext Transmission of Sensitive Information. During the device setup phase, the MSH30Q creates an unprotected Wi-Fi access point. In this phase, MSH30Q needs ...
How severe is CVE-2023-46889?
CVE-2023-46889 has been rated MEDIUM with a CVSS base score of 5.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-46889?
Check the references section above for vendor advisories and patch information. Affected products include: Meross Msh30Q Firmware, Meross Msh30Q.