Описание
Mesh OS before 7.9.1.1 on Tropos wireless mesh routers does not use a sufficient source of entropy for SSH keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
Уязвимые конфигурации
Конфигурация 1Версия до 7.9.1 (включая)
Одновременно
cpe:2.3:o:tropos:mesh_os:*:*:*:*:*:*:*:*
Одно из
cpe:2.3:h:tropos:1310_distrubution_automation_mesh_router:-:*:*:*:*:*:*:*
cpe:2.3:h:tropos:1410_mesh_router:-:*:*:*:*:*:*:*
cpe:2.3:h:tropos:1410_wireless_mesh_router:-:*:*:*:*:*:*:*
cpe:2.3:h:tropos:3310_indoor_mesh_router:-:*:*:*:*:*:*:*
cpe:2.3:h:tropos:3320_indoor_mesh_router:-:*:*:*:*:*:*:*
cpe:2.3:h:tropos:4310_mobile_mesh_router:-:*:*:*:*:*:*:*
cpe:2.3:h:tropos:6310_mesh_router:-:*:*:*:*:*:*:*
cpe:2.3:h:tropos:6320_mesh_router:-:*:*:*:*:*:*:*
EPSS
Процентиль: 35%
0.00148
Низкий
6.1 Medium
CVSS2
6.1 Medium
CVSS2
Дефекты
CWE-310
Связанные уязвимости
github
больше 3 лет назад
Mesh OS before 7.9.1.1 on Tropos wireless mesh routers does not use a sufficient source of entropy for SSH keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
EPSS
Процентиль: 35%
0.00148
Низкий
6.1 Medium
CVSS2
6.1 Medium
CVSS2
Дефекты
CWE-310