10
CVE-2019-12941
- EPSS 0.45%
- Veröffentlicht 14.10.2019 18:15:10
- Zuletzt bearbeitet 21.11.2024 04:23:52
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Autopi ≫ Wi-fi/nb Firmware Version < 2019-10-15
Autopi ≫ 4g/lte Firmware Version < 2019-10-15
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.45% | 0.628 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-307 Improper Restriction of Excessive Authentication Attempts
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.