CVE-2015-7286

CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 rely on a polyalphabetic substitution cipher with hardcoded keys, which makes it easier for remote attackers to defeat a cryptographic protection mechanism by capturing IP or V.22bis PSTN protocol traffic.
References
Link Resource
http://cybergibbons.com/?p=2844 Exploit
http://www.kb.cert.org/vuls/id/428280 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/BLUU-A3NQAL Third Party Advisory US Government Resource
http://cybergibbons.com/?p=2844 Exploit
http://www.kb.cert.org/vuls/id/428280 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/BLUU-A3NQAL Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:csl_dualcom:gprs_cs2300-r_firmware:1.25:*:*:*:*:*:*:*
cpe:2.3:o:csl_dualcom:gprs_cs2300-r_firmware:3.53:*:*:*:*:*:*:*
cpe:2.3:h:csl_dualcom:gprs:cs2300-r:*:*:*:*:*:*:*

History

21 Nov 2024, 02:36

Type Values Removed Values Added
References () http://cybergibbons.com/?p=2844 - Exploit () http://cybergibbons.com/?p=2844 - Exploit
References () http://www.kb.cert.org/vuls/id/428280 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/428280 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/BLUU-A3NQAL - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/BLUU-A3NQAL - Third Party Advisory, US Government Resource

Information

Published : 2015-11-25 04:59

Updated : 2024-11-21 02:36


NVD link : CVE-2015-7286

Mitre link : CVE-2015-7286

CVE.ORG link : CVE-2015-7286


JSON object : View

Products Affected

csl_dualcom

  • gprs
  • gprs_cs2300-r_firmware
CWE
CWE-310

Cryptographic Issues