CVE-2023-6951

Description

A Use of Weak Credentials vulnerability affecting the Wi-Fi network generated by a set of DJI drones could allow a remote attacker to derive the WPA2 PSK key and authenticate without permission to the drone’s Wi- Fi network. This, in turn, allows the attacker to perform unauthorized interaction with the network services exposed by the drone and to potentially decrypt the Wi-Fi traffic exchanged between the drone and the Android/IOS device of the legitimate user during QuickTransfer mode. Affected models are Mavic 3 Pro until v01.01.0300, Mavic 3 until v01.00.1200, Mavic 3 Classic until v01.00.0500, Mavic 3 Enterprise until v07.01.10.03, Matrice 300 until v57.00.01.00, Matrice M30 until v07.01.0022 and Mini 3 Pro until v01.00.0620.

Category

6.6
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.09%
Affected: DJI Mavic 3 Pro
Affected: DJI Mavic 3
Affected: DJI Mavic 3 Classic
Affected: DJI Mavic 3 Enterprise
Affected: DJI Matrice 300
Affected: DJI Matrice M30
Affected: DJI Mini 3 Pro
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-6951?
CVE-2023-6951 has been scored as a medium severity vulnerability.
How to fix CVE-2023-6951?
To fix CVE-2023-6951, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-6951 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-6951 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-6951?
CVE-2023-6951 affects DJI Mavic 3 Pro, DJI Mavic 3, DJI Mavic 3 Classic, DJI Mavic 3 Enterprise, DJI Matrice 300, DJI Matrice M30, DJI Mini 3 Pro.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.