Vulnerability CVE-2014-9408


Published: 2014-12-19

Description:
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 uses part of the MAC address as part of the RC4 setup key, which makes it easier for remote attackers to guess the key via a brute-force attack.

See advisories in our WLB2 database:
Topic
Author
Date
High
Ekahau Multiple Vulnerabilities
Max Moser, David...
22.12.2014

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Ekahau -> Activator 
Ekahau -> B4 staff badge tag firmware 
Ekahau -> Real-time location system controller 
Ekahau -> B4 staff badge tag 

 References:
http://packetstormsecurity.com/files/129585/Ekahau-Real-Time-Location-System-RC4-Cipher-Stream-Reuse-Weak-Key-Derivation.html
http://www.modzero.ch/advisories/MZ-14-01-Ekahau-RTLS.txt
http://www.securityfocus.com/archive/1/534241/100/0/threaded
http://www.securityfocus.com/bid/71674

Copyright 2024, cxsecurity.com

 

Back to Top