CVE-2025-55293

9.4 CRITICAL

📋 TL;DR

This vulnerability allows an attacker to impersonate legitimate nodes in a Meshtastic mesh network by manipulating public key assignments. Attackers can first send a NodeInfo packet with an empty public key to clear existing keys, then send a new malicious key to take over node identities. All Meshtastic users running versions before 2.6.3 are affected.

💻 Affected Systems

Products:
  • Meshtastic firmware
Versions: All versions prior to 2.6.3
Operating Systems: All platforms running Meshtastic
Default Config Vulnerable: ⚠️ Yes
Notes: All Meshtastic deployments using affected firmware versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network compromise where attackers impersonate any node, intercept all communications, inject malicious data, and potentially disrupt critical infrastructure relying on mesh networking.

🟠

Likely Case

Attackers impersonate nodes to intercept sensitive communications, inject false data, or disrupt network operations in affected mesh deployments.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but still allows localized impersonation attacks within mesh segments.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to send crafted NodeInfo packets but no authentication. The technique is documented in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.3

Vendor Advisory: https://github.com/meshtastic/firmware/security/advisories/GHSA-95pq-gj5v-4fg2

Restart Required: Yes

Instructions:

1. Download Meshtastic firmware version 2.6.3 or later from official sources. 2. Flash the firmware to all affected devices. 3. Verify all devices are running patched version.

🔧 Temporary Workarounds

Network segmentation

all

Isolate Meshtastic networks from untrusted networks to prevent external attackers from accessing mesh traffic.

Monitor for key changes

all

Implement monitoring to detect unexpected public key changes in NodeDB entries.

🧯 If You Can't Patch

  • Segment mesh networks from untrusted networks and internet access
  • Implement strict network monitoring for abnormal NodeInfo packets and key changes

🔍 How to Verify

Check if Vulnerable:

Check firmware version on Meshtastic devices. If version is below 2.6.3, the device is vulnerable.

Check Version:

Use Meshtastic client or device interface to check firmware version

Verify Fix Applied:

Confirm firmware version is 2.6.3 or higher on all devices. Test by attempting to send crafted NodeInfo packets (in controlled environment) to verify they are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Multiple NodeInfo packets from same source with empty public keys followed by new keys
  • Unexpected public key changes in NodeDB

Network Indicators:

  • Unusual NodeInfo packet patterns
  • Rapid succession of NodeInfo packets with key manipulation

SIEM Query:

source="meshtastic" AND (event="NodeInfo" AND (public_key="" OR key_change="true"))

🔗 References

📤 Share & Export