Description

Meshtastic is an open source mesh networking solution. The Meshtastic firmware (starting from version 2.5) introduces asymmetric encryption (PKI) for direct messages, but when the `pki_encrypted` flag is missing, the firmware silently falls back to legacy AES-256-CTR channel encryption. This was an intentional decision to maintain backwards compatibility. However, the end-user applications, like Web app, iOS/Android app, and applications built on top of Meshtastic using the SDK, did not have a way to differentiate between end-to-end encrypted DMs and the legacy DMs. This creates a downgrade attack path where adversaries who know a shared channel key can craft and inject spoofed direct messages that are displayed as if they were PKC encrypted. Users are not given any feedback of whether a direct message was decrypted with PKI or with legacy symmetric encryption, undermining the expected security guarantees of the PKI rollout. Version 2.7.15 fixes this issue.

INFO

Published Date :

2025-12-29T16:18:29.680Z

Last Modified :

2025-12-29T16:52:03.331Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-53627 vulnerability.

Vendors Products
Google
  • Android
Meshtastic
  • Firmware
  • Meshtastic Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-53627.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact