AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
References
Link | Resource |
---|---|
http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdf | Exploit Third Party Advisory |
https://www.kth.se/nse/research/software-systems-architecture-and-security/ | Third Party Advisory |
https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-10-14T17:02:22
Updated: 2019-10-14T17:02:22
Reserved: 2019-06-24T00:00:00
Link: CVE-2019-12941
JSON object: View
NVD Information
Status : Modified
Published: 2019-10-14T18:15:10.387
Modified: 2023-11-07T03:03:43.947
Link: CVE-2019-12941
JSON object: View
Redhat Information
No data.
CWE