← Back to CVEs
CVE-2019-12941
CRITICAL9.8
Description
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/14/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
autopi:4g\/lteautopi:4g\/lte_firmwareautopi:wi-fi\/nbautopi:wi-fi\/nb_firmware
Weaknesses (CWE)
CWE-307
References
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf(cve@mitre.org)
http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://www.kth.se/nse/research/software-systems-architecture-and-security/(af854a3a-2127-422b-91ae-364da2661108)
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.