Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104940 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01 | Mitigation Third Party Advisory US Government Resource |
https://www.exploit-db.com/exploits/45076/ | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/104940 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01 | Mitigation Third Party Advisory US Government Resource |
https://www.exploit-db.com/exploits/45076/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/104940 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01 - Mitigation, Third Party Advisory, US Government Resource | |
References | () https://www.exploit-db.com/exploits/45076/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-08-01 18:29
Updated : 2024-11-21 03:41
NVD link : CVE-2018-10618
Mitre link : CVE-2018-10618
CVE.ORG link : CVE-2018-10618
JSON object : View
Products Affected
davolink
- dvw-3200n_firmware
- dvw-3200n
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort