Описание
The WPS implementation on I-O DATA DEVICE WN-GDN/R3, WN-GDN/R3-C, WN-GDN/R3-S, and WN-GDN/R3-U devices does not limit PIN guesses, which allows remote attackers to obtain network access via a brute-force attack.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:iodata:wn-gdn\/r3_firmware:-:*:*:*:*:*:*:*
Одно из
cpe:2.3:h:iodata:wn-gdn\/r3:-:*:*:*:*:*:*:*
cpe:2.3:h:iodata:wn-gdn\/r3-c:-:*:*:*:*:*:*:*
cpe:2.3:h:iodata:wn-gdn\/r3-s:-:*:*:*:*:*:*:*
cpe:2.3:h:iodata:wn-gdn\/r3-u:-:*:*:*:*:*:*:*
EPSS
Процентиль: 35%
0.00139
Низкий
4.3 Medium
CVSS3
3.3 Low
CVSS2
Дефекты
CWE-200
Связанные уязвимости
CVSS3: 4.3
github
больше 3 лет назад
The WPS implementation on I-O DATA DEVICE WN-GDN/R3, WN-GDN/R3-C, WN-GDN/R3-S, and WN-GDN/R3-U devices does not limit PIN guesses, which allows remote attackers to obtain network access via a brute-force attack.
EPSS
Процентиль: 35%
0.00139
Низкий
4.3 Medium
CVSS3
3.3 Low
CVSS2
Дефекты
CWE-200