CVE-2019-9555

Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small.
References
Link Resource
https://seclists.org/fulldisclosure/2019/Mar/12 Mailing List Mitigation Third Party Advisory
https://seclists.org/fulldisclosure/2019/Mar/12 Mailing List Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sagemcom:f\@st_5260_firmware:0.4.39:*:*:*:*:*:*:*
cpe:2.3:h:sagemcom:f\@st_5260:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:51

Type Values Removed Values Added
References () https://seclists.org/fulldisclosure/2019/Mar/12 - Mitigation, Mailing List, Third Party Advisory () https://seclists.org/fulldisclosure/2019/Mar/12 - Mailing List, Mitigation, Third Party Advisory

Information

Published : 2019-03-05 23:29

Updated : 2024-11-21 04:51


NVD link : CVE-2019-9555

Mitre link : CVE-2019-9555

CVE.ORG link : CVE-2019-9555


JSON object : View

Products Affected

sagemcom

  • f\@st_5260_firmware
  • f\@st_5260
CWE
CWE-331

Insufficient Entropy