Authentication Bypass Vulnerability in Meshtastic Networking Solution by Meshtastic
CVE-2025-55292

8.2HIGH

Key Information:

Vendor

Meshtastic

Status
Vendor
CVE Published:
27 January 2026

What is CVE-2025-55292?

The Meshtastic networking solution presents an authentication bypass vulnerability due to its architecture, where a Node is identified by a NodeID derived from the MAC address instead of its public key. This weakness allows an attacker to exploit the HAM mode, which lacks encryption, and forge NodeInfo for a victim node. By doing so, the attacker can manipulate NodeDB data and change node details, enabling ongoing attacks by repeatedly sending forged information. The issue compromises the confidentiality and authenticity of messaging within the mesh network. A solution is available in the latest firmware update.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

firmware <= 2.6.2

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.