Skip to main content

CVE-2023-6339: CWE-311 Missing Encryption of Sensitive Data in Google Wifi Pro

Critical
VulnerabilityCVE-2023-6339cvecve-2023-6339cwe-311
Published: Tue Jan 02 2024 (01/02/2024, 21:44:05 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Wifi Pro

Description

Google Nest WiFi Pro root code-execution & user-data compromise

AI-Powered Analysis

AILast updated: 07/04/2025, 05:25:12 UTC

Technical Analysis

CVE-2023-6339 is a critical vulnerability affecting Google Nest Wifi Pro devices, specifically version 14150. The vulnerability is categorized under CWE-311, which indicates missing encryption of sensitive data. This flaw allows an attacker to execute root-level code on the device remotely without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability at the highest level (C:H/I:H/A:H), meaning that an attacker can fully compromise the device, access sensitive user data, and potentially disrupt network services. The root cause is the lack of encryption for sensitive data transmitted or stored by the device, which exposes it to interception or manipulation. Exploitation could lead to full device takeover, data compromise, and network disruption. Although no public exploits have been reported yet, the critical severity and ease of exploitation make this a significant threat. The vulnerability affects a widely deployed consumer and enterprise-grade Wi-Fi mesh networking product, which is often used in home and small office environments to provide internet connectivity and network management. The absence of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation and monitoring.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially for those using Google Nest Wifi Pro devices in their network infrastructure. The compromise of these devices can lead to unauthorized access to internal networks, interception of sensitive communications, and potential lateral movement within corporate environments. Given the critical nature of the flaw, attackers could disrupt business operations by disabling network connectivity or exfiltrating confidential data. Small and medium enterprises (SMEs) and home offices that rely on these devices for secure connectivity are particularly vulnerable. Additionally, the exposure of user data could lead to privacy violations under the GDPR framework, resulting in legal and financial repercussions. The lack of encryption also undermines trust in network security, potentially affecting sectors that require stringent data protection such as finance, healthcare, and government agencies.

Mitigation Recommendations

Immediate mitigation steps include isolating Google Nest Wifi Pro devices from critical network segments and monitoring network traffic for unusual activity. Organizations should implement network segmentation to limit the impact of a compromised device. Employing strong network access controls and intrusion detection/prevention systems can help detect exploitation attempts. Since no patch is currently available, users should consider temporarily replacing affected devices with alternatives that have verified security. Regularly updating device firmware as soon as patches are released is essential. Additionally, organizations should enforce strict Wi-Fi security policies, including disabling remote management features if not required, and using VPNs to encrypt traffic beyond the device level. Conducting security awareness training for users about risks associated with IoT and network devices can further reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google_Devices
Date Reserved
2023-11-27T22:21:29.137Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff325

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/4/2025, 5:25:12 AM

Last updated: 7/29/2025, 2:27:37 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats