Vulnerability Details : CVE-2023-6951
A Use of Weak Credentials vulnerability affecting the Wi-Fi network generated by a set of DJI drones could allow a remote attacker to derive the WPA2 PSK key and authenticate without permission to the drone’s Wi- Fi network. This, in turn, allows the attacker to perform unauthorized interaction with the network services exposed by the drone and to potentially decrypt the Wi-Fi traffic exchanged between the drone and the Android/IOS device of the legitimate user during QuickTransfer mode. Affected models are Mavic 3 Pro until v01.01.0300, Mavic 3 until v01.00.1200, Mavic 3 Classic until v01.00.0500, Mavic 3 Enterprise until v07.01.10.03, Matrice 300 until v57.00.01.00, Matrice M30 until v07.01.0022 and Mini 3 Pro until v01.00.0620.
Products affected by CVE-2023-6951
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-6951
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 9 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6951
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.6
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N |
2.1
|
4.0
|
Nozomi Networks Inc. | 2024-04-02 |
CWE ids for CVE-2023-6951
-
The number of possible random values is smaller than needed by the product, making it more susceptible to brute force attacks.Assigned by: prodsec@nozominetworks.com (Primary)
-
The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker.Assigned by: prodsec@nozominetworks.com (Secondary)
References for CVE-2023-6951
-
https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-6951/
CVE-2023-6951 | Nozomi Networks Labs
Jump to