| |
Vulnerability CVE-2019-9555
Published: 2019-03-05 Modified: 2019-03-06
Description: |
Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small. |
See advisories in our WLB2 database: | Topic | Author | Date |
Med. |
| Ryan Delaney | 07.03.2019 |
Type:
CWE-254 (Security Features)
CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5/10 |
2.9/10 |
10/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
None |
None |
References: |
https://seclists.org/fulldisclosure/2019/Mar/12
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|