Show plain JSON{"id": "CVE-2019-12941", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2019-10-14T18:15:10.387", "references": [{"url": "http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdf", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.kth.se/nse/research/software-systems-architecture-and-security/", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf", "source": "cve@mitre.org"}, {"url": "http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdf", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.kth.se/nse/research/software-systems-architecture-and-security/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-307"}]}], "descriptions": [{"lang": "en", "value": "AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID."}, {"lang": "es", "value": "Los dispositivos AutoPi Wi-Fi/NB y 4G/LTE en versiones anteriores al 15-10-2019 permiten a un atacante realizar un ataque de fuerza bruta o ataque de diccionario para obtener acceso a la red WiFi, que proporciona acceso de ra\u00edz al dispositivo. La contrase\u00f1a WiFi predeterminada y el SSID WiFi se derivan de la misma salida de funci\u00f3n hash (la entrada es de solo 8 caracteres), lo que permite que un atacante deduzca la contrase\u00f1a WiFi del SSID WiFi."}], "lastModified": "2024-11-21T04:23:52.177", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:autopi:wi-fi\\/nb_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "519AC805-A0CC-4966-A690-5724F480768C", "versionEndExcluding": "2019-10-15"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:autopi:wi-fi\\/nb:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8FD8E58D-7F2E-4BFB-9261-30707381317E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:autopi:4g\\/lte_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2413EB10-8171-4FFB-A8A1-248B4109B9B6", "versionEndExcluding": "2019-10-15"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:autopi:4g\\/lte:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6D3AA4D3-F100-4111-93BB-1FA014E15F61"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}