Описание
Arris DG860A and DG1670A devices have predictable default WPA2 PSKs that could lead to unauthorized remote access. (They use the first 6 characters of the SSID and the last 6 characters of the BSSID, decrementing the last digit.)
Ссылки
- Third Party Advisory
- Product
- Third Party Advisory
- Product
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:arris:dg860a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arris:dg860a:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:arris:dg1670a_firmware:ts0901203b6_020420_16xx.gw_pc20_tw:*:*:*:*:*:*:*
cpe:2.3:h:arris:dg1670a:-:*:*:*:*:*:*:*
EPSS
Процентиль: 18%
0.00058
Низкий
8.8 High
CVSS3
Дефекты
CWE-287
Связанные уязвимости
CVSS3: 8.8
github
около 2 лет назад
Arris DG860A and DG1670A devices have predictable default WPA2 PSKs that could lead to unauthorized remote access. (They use the first 6 characters of the SSID and the last 6 characters of the BSSID, decrementing the last digit.)
EPSS
Процентиль: 18%
0.00058
Низкий
8.8 High
CVSS3
Дефекты
CWE-287