Huawei home gateways WS318 with software V100R001C01B022 and earlier versions are affected by the PIN offline brute force cracking vulnerability of the WPS protocol because the random number generator (RNG) used in the supplier's solution is not random enough. As a result, brute force cracking the PIN code is easier. After an attacker cracks the PIN, the attacker can access the Internet via the cracked device.
References
Link | Resource |
---|---|
http://www.huawei.com/en/psirt/security-advisories/hw-408091 | Vendor Advisory |
http://www.huawei.com/en/psirt/security-advisories/hw-408091 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.huawei.com/en/psirt/security-advisories/hw-408091 - Vendor Advisory |
Information
Published : 2017-04-02 20:59
Updated : 2024-11-21 02:21
NVD link : CVE-2014-9690
Mitre link : CVE-2014-9690
CVE.ORG link : CVE-2014-9690
JSON object : View
Products Affected
huawei
- ws318_firmware
- ws318
CWE
CWE-332
Insufficient Entropy in PRNG