Описание
Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small.
Ссылки
- Mailing ListMitigationThird Party Advisory
- Mailing ListMitigationThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:sagemcom:f\@st_5260_firmware:0.4.39:*:*:*:*:*:*:*
cpe:2.3:h:sagemcom:f\@st_5260:-:*:*:*:*:*:*:*
EPSS
Процентиль: 48%
0.00245
Низкий
5.3 Medium
CVSS3
5 Medium
CVSS2
Дефекты
CWE-331
Связанные уязвимости
CVSS3: 5.3
github
больше 3 лет назад
Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small.
EPSS
Процентиль: 48%
0.00245
Низкий
5.3 Medium
CVSS3
5 Medium
CVSS2
Дефекты
CWE-331