CVE-2025-53627 (CNNVD-202512-4955)
中文标题:
Meshtastic 安全漏洞
英文标题:
Meshtastic firmware allows forged DMs with no PKC to show up as encrypted
漏洞描述
中文描述:
Meshtastic是Meshtastic开源的一种去中心化无线离网网状网络 LoRa 协议。 Meshtastic 2.5版本至2.7.15之前版本存在安全漏洞,该漏洞源于缺少PKI加密标志时的降级攻击路径,可能导致攻击者注入伪造的直接消息。
英文描述:
Meshtastic is an open source mesh networking solution. The Meshtastic firmware (starting from version 2.5) introduces asymmetric encryption (PKI) for direct messages, but when the `pki_encrypted` flag is missing, the firmware silently falls back to legacy AES-256-CTR channel encryption. This was an intentional decision to maintain backwards compatibility. However, the end-user applications, like Web app, iOS/Android app, and applications built on top of Meshtastic using the SDK, did not have a way to differentiate between end-to-end encrypted DMs and the legacy DMs. This creates a downgrade attack path where adversaries who know a shared channel key can craft and inject spoofed direct messages that are displayed as if they were PKC encrypted. Users are not given any feedback of whether a direct message was decrypted with PKI or with legacy symmetric encryption, undermining the expected security guarantees of the PKI rollout. Version 2.7.15 fixes this issue.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| meshtastic | firmware | >= 2.5, < 2.7.15 | - | - |
cpe:2.3:a:meshtastic:firmware:>=_2.5,_<_2.7.15:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-53627 |
2025-12-30 04:11:40 | 2026-01-12 02:11:56 |
| NVD | nvd_CVE-2025-53627 |
2026-01-01 04:27:48 | 2026-01-12 02:27:52 |
| CNNVD | cnnvd_CNNVD-202512-4955 |
2026-01-11 06:15:04 | 2026-01-12 02:38:08 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202512-4955
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']