← Retour aux CVEs
CVE-2019-12941
CRITICAL9.8
Description
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie10/14/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
autopi:4g\/lteautopi:4g\/lte_firmwareautopi:wi-fi\/nbautopi:wi-fi\/nb_firmware
Faiblesses (CWE)
CWE-307
References
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf(cve@mitre.org)
http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://www.kth.se/nse/research/software-systems-architecture-and-security/(af854a3a-2127-422b-91ae-364da2661108)
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.