← Volver a CVEs
CVE-2019-12941
CRITICAL9.8
Descripcion
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado10/14/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
autopi:4g\/lteautopi:4g\/lte_firmwareautopi:wi-fi\/nbautopi:wi-fi\/nb_firmware
Debilidades (CWE)
CWE-307
Referencias
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf(cve@mitre.org)
http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://www.kth.se/nse/research/software-systems-architecture-and-security/(af854a3a-2127-422b-91ae-364da2661108)
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.