We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-52883

Meshtastic-Android vulnerable to forged DMs with no PKC showing up as encrypted



Description

Meshtastic-Android is an Android application for the mesh radio software Meshtastic. Prior to version 2.5.21, an attacker is able to send an unencrypted direct message to a victim impersonating any other node of the mesh. This message will be displayed in the same chat that the victim normally communicates with the other node and it will appear as using PKC, while it is not. This means that the victim will be provided with a false sense of security due to the green padlock displayed when using PKC and they'll read the attacker's message as legitimate. Version 2.5.21 contains a patch for the issue. It is suggested to implement a stricter control on whether a message has been received using PKC or using the shared Meshtastic channel key. Moreover, instead of showing no green padlock icon in the chat with no PKC, consider using an explicit indicator like, for example, the yellow half-open padlock displayed when in HAM mode. This remediation, however, applies to the client applications rather than the Meshtastic firmware.

Reserved 2025-06-20 | Published 2025-06-24 | Updated 2025-06-24 | Assigner GitHub_M


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-1287: Improper Validation of Specified Type of Input

Product status

< 2.5.21
affected

References

github.com/...ndroid/security/advisories/GHSA-h4rg-g6f3-ghh7

github.com/meshtastic/Meshtastic-Android/pull/1720

cve.org (CVE-2025-52883)

nvd.nist.gov (CVE-2025-52883)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-52883

Support options

Helpdesk Chat, Email, Knowledgebase