Critical Meshtastic Vulnerability:

CVE-2025-52464: Meshtastic 2.5.0–2.6.10 shipped cloned or low-entropy X25519 keys via vendor pre-flash + weak RNG.

Collisions let attackers decrypt LoRa direct-msgs, replay/forge admin RPCs, hijack nodes; no forward secrecy, so old captures stay cleartext.

Firmware 2.6.11 defers key-gen, hardens entropy, flags compromised pairs.

https://mander.xyz/post/32783704

Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages - Mander

Meshtastic developers released firmware version 2.6.11 with critical fixes: Key generation delay: Keys are now generated when users first set their LoRa region, preventing vendor-side duplication. Entropy improvements: Added multiple randomness sources to strengthen cryptographic initialization. Compromised key detection: Devices now warn users if known vulnerable keys are detected. An upcoming version (2.6.12) will automatically wipe compromised keys. For immediate protection, users should: Update devices to firmware 2.6.11 or later. Perform a factory reset using Meshtastic’s CLI: meshtastic –factory-reset-device. Manually generate high-entropy keys via OpenSSL for critical deployments.

Administrators should immediately:

meshtastic --factory-reset-device

to purge stored state, flash ≥ v2.6.11, and, for secure deployments, regenerate keys offline:

openssl genpkey -algorithm x25519 -outform DER | tail -c32 | base64

Until every node is re-keyed and reflashed, attackers with the dup-keys can continue decrypting, issuing rogue commands in mixed-firmware meshes.

Upcoming v2.6.12 auto-purges compromised pairs.

Remote admin calls only alter config—firmware & SPI flash off-limits—yet with a valid admin key an attacker can rewrite boot_role, PSKs or routing tables: bricking headless repeaters, decrypting / redirecting LoRa traffic, and hijacking nodes.

RemoteHardware builds expose GPIO read/write, so attached sensors or relays can be manipulated, risking safety.

Setting security.is_managed true then wiping admin_keys locks owners out so no reconfiguration over serial/BLE without a full factory reset.

@dragosr Do you know if there are plans to add forward secrecy?
@alxndr all I have to say is Meshcore. :)