Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Meshtastic-Android vulnerable to forged DMs with no PKC showing up as encrypted
Vulnerability Description
Meshtastic-Android is an Android application for the mesh radio software Meshtastic. Prior to version 2.5.21, an attacker is able to send an unencrypted direct message to a victim impersonating any other node of the mesh. This message will be displayed in the same chat that the victim normally communicates with the other node and it will appear as using PKC, while it is not. This means that the victim will be provided with a false sense of security due to the green padlock displayed when using PKC and they'll read the attacker's message as legitimate. Version 2.5.21 contains a patch for the issue. It is suggested to implement a stricter control on whether a message has been received using PKC or using the shared Meshtastic channel key. Moreover, instead of showing no green padlock icon in the chat with no PKC, consider using an explicit indicator like, for example, the yellow half-open padlock displayed when in HAM mode. This remediation, however, applies to the client applications rather than the Meshtastic firmware.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Vulnerability Type
CWE-1287
Vulnerability Title
Meshtastic-Android 安全漏洞
Vulnerability Description
Meshtastic-Android是Meshtastic开源的一个Android应用程序。 Meshtastic-Android 2.5.21之前版本存在安全漏洞,该漏洞源于攻击者可发送未加密直接消息冒充其他节点,可能导致虚假安全感。
CVSS Information
N/A
Vulnerability Type
N/A