{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T18:46:03.209","vulnerabilities":[{"cve":{"id":"CVE-2023-6951","sourceIdentifier":"prodsec@nozominetworks.com","published":"2024-04-02T11:15:51.417","lastModified":"2024-11-21T08:44:54.380","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"A Use of Weak Credentials vulnerability affecting the Wi-Fi network generated by a set of DJI drones could allow a remote attacker to derive the WPA2 PSK key and authenticate without permission to the drone’s Wi- Fi network. This, in turn, allows the attacker to perform unauthorized interaction with the network services exposed by the drone and to potentially decrypt the Wi-Fi traffic exchanged between the drone and the Android\/IOS device of the legitimate user during QuickTransfer mode. Affected models are Mavic 3 Pro until v01.01.0300, Mavic 3 until v01.00.1200, Mavic 3 Classic until v01.00.0500, Mavic 3 Enterprise until v07.01.10.03, Matrice 300 until v57.00.01.00, Matrice M30 until v07.01.0022 and Mini 3 Pro until v01.00.0620."},{"lang":"es","value":"Una vulnerabilidad de uso de credenciales débiles que afecta a la red Wi-Fi generada por un conjunto de drones DJI podría permitir que un atacante remoto obtenga la clave WPA2 PSK y se autentique sin permiso en la red Wi-Fi del dron. Esto, a su vez, permite al atacante realizar una interacción no autorizada con los servicios de red expuestos por el dron y potencialmente descifrar el tráfico Wi-Fi intercambiado entre el dron y el dispositivo Android\/IOS del usuario legítimo durante el modo QuickTransfer. Los modelos afectados son Mavic 3 Pro hasta v01.01.0300, Mavic 3 hasta v01.00.1200, Mavic 3 Classic hasta v01.00.0500, Mavic 3 Enterprise hasta v07.01.10.03, Matrice 300 hasta v57.00.01.00, Matrice M30 hasta v07. 01.0022 y Mini 3 Pro hasta v01.00.0620."}],"metrics":{"cvssMetricV31":[{"source":"prodsec@nozominetworks.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:R\/S:C\/C:H\/I:N\/A:N","baseScore":6.6,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":4.0}]},"weaknesses":[{"source":"prodsec@nozominetworks.com","type":"Secondary","description":[{"lang":"en","value":"CWE-334"}]}],"references":[{"url":"https:\/\/www.nozominetworks.com\/labs\/vulnerability-advisories-cve-2023-6951\/","source":"prodsec@nozominetworks.com"},{"url":"https:\/\/www.nozominetworks.com\/labs\/vulnerability-advisories-cve-2023-6951\/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}