← Zuruck zu CVEs
CVE-2019-12941
CRITICAL9.8
Beschreibung
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/14/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
autopi:4g\/lteautopi:4g\/lte_firmwareautopi:wi-fi\/nbautopi:wi-fi\/nb_firmware
Schwachen (CWE)
CWE-307
Referenzen
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf(cve@mitre.org)
http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://www.kth.se/nse/research/software-systems-architecture-and-security/(af854a3a-2127-422b-91ae-364da2661108)
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.