4.3
CVE-2023-45194
- EPSS 0.07%
- Veröffentlicht 11.10.2023 01:15:08
- Zuletzt bearbeitet 21.11.2024 08:26:31
- Quelle vultures@jpcert.or.jp
- CVE-Watchlists
- Unerledigt
Use of default credentials vulnerability in MR-GM2 firmware Ver. 3.00.03 and earlier, and MR-GM3 (-D/-K/-S/-DK/-DKS/-M/-W) firmware Ver. 1.03.45 and earlier allows a network-adjacent unauthenticated attacker to intercept wireless LAN communication, when the affected product performs the communication without changing the pre-shared key from the factory-default configuration.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mrl ≫ Mr-gm3-d Firmware Version < 1.04.00
Mrl ≫ Mr-gm3-k Firmware Version < 1.04.00
Mrl ≫ Mr-gm3-s Firmware Version < 1.04.00
Mrl ≫ Mr-gm3-dks Firmware Version < 1.04.00
Mrl ≫ Mr-gm3-m Firmware Version < 1.04.00
Mrl ≫ Mr-gm2 Firmware Version < 3.01.00
Mrl ≫ Mr-gm3-w Firmware Version < 1.04.00
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.215 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.