← Voltar para CVEs
CVE-2019-12941
CRITICAL9.8
Descricao
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado10/14/2019
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
autopi:4g\/lteautopi:4g\/lte_firmwareautopi:wi-fi\/nbautopi:wi-fi\/nb_firmware
Fraquezas (CWE)
CWE-307
Referencias
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf(cve@mitre.org)
http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://www.kth.se/nse/research/software-systems-architecture-and-security/(af854a3a-2127-422b-91ae-364da2661108)
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.