Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages

A critical security vulnerability has been discovered in Meshtastic firmware that could allow attackers to decrypt private messages sent between devices.  The flaw, assigned a CVSS score of 9.5 out of 10, affects all versions above 2.5.0 and stems from repeated public/private key pairs generated during hardware flashing procedures.  This vulnerability poses significant risks to […] The post Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages appeared first on Cyber Security News.

Jun 23, 2025 - 12:10
 0
Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages
Summary
1. Meshtastic firmware above v2.5.0 has a severe security flaw allowing attackers to decrypt private messages.
2. Duplicate cryptographic keys and poor randomness in key generation created predictable, compromised keys across devices.
3. Attackers can read encrypted messages and gain unauthorized admin access to mesh network nodes.
4. Update to v2.6.11 immediately and perform factory reset using meshtastic --factory-reset-device command.

A critical security vulnerability has been discovered in Meshtastic firmware that could allow attackers to decrypt private messages sent between devices. 

The flaw, assigned a CVSS score of 9.5 out of 10, affects all versions above 2.5.0 and stems from repeated public/private key pairs generated during hardware flashing procedures. 

This vulnerability poses significant risks to the privacy and security of mesh network communications, potentially exposing sensitive user data to malicious actors who have compiled lists of compromised cryptographic keys.

Meshtastic Cryptographic Implementation Flaws

The security flaw originates from two distinct but related issues in the Meshtastic firmware’s cryptographic implementation. 

First, several hardware vendors’ flashing procedures were inadvertently creating duplicated public/private key pairs across multiple devices. 

This means that different Meshtastic nodes could end up sharing identical cryptographic credentials, fundamentally undermining the security model that assumes each device has unique keys.

The second critical issue involves the improper initialization of the randomness pool in the rweather/crypto library used by Meshtastic. 

On certain platforms, this library was failing to properly seed its internal randomness source, resulting in low-entropy key generation. 

Low entropy in cryptographic key generation is particularly dangerous because it makes keys predictable and significantly easier for attackers to crack or guess through brute-force methods.

The vulnerability creates multiple attack vectors that compromise both direct messaging and remote administration features. 

When users with affected key pairs send Direct Messages through the mesh network, these communications can be intercepted and decrypted by attackers who possess the corresponding private keys from the compromised key list.

The remote administration functionality faces dual exposure paths. If a compromised key is added as a remote administrator, any individual with access to that private key could gain administrative control over the node. 

In scenarios where the remotely administered node itself possesses the compromised key pair, attackers could determine an authorized administrator’s public key, use the compromised private key to generate the resulting shared_key, and subsequently impersonate legitimate administrators to send malicious commands.

Patch Available

Meshtastic has released version 2.6.11 as an immediate response to address these vulnerabilities. 

This patch implements several protective measures, including warning users when compromised keys are detected and delaying key generation until the first time the LoRa region is configured, effectively eliminating the vendor cloning issue. 

The update also incorporates multiple randomness sources during rweather/crypto RND initialization to ensure higher entropy key generation.

For immediate protection, users can perform a complete device wipe using the Python Command Line Interface with the command: meshtastic –factory-reset-device. 

For users requiring maximum security assurance, generating truly high-entropy keys using OpenSSL is recommended: openssl genpkey -algorithm x25519 -outform DER | tail -c32 | base64. 

Version 2.6.12 will automatically remove known compromised keys when detected, providing additional automated protection for affected users.

Are you from SOC/DFIR Teams! - Interact with malware in the sandbox and find related IOCs. - Request 14-day free trial

The post Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages appeared first on Cyber Security News.