Vulnerabilities > CVE-2019-9555 - Insufficient Entropy vulnerability in Sagemcom F@St 5260 Firmware 0.4.39
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
LOW Integrity impact
NONE Availability impact
NONE Summary
Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Hardware | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
Packetstorm
data source | https://packetstormsecurity.com/files/download/151976/sagemcom-psk.txt |
id | PACKETSTORM:151976 |
last seen | 2019-03-07 |
published | 2019-03-05 |
reporter | Ryan Delaney |
source | https://packetstormsecurity.com/files/151976/Sagemcom-Router-Insufficient-Default-PSK-Entropy.html |
title | Sagemcom Router Insufficient Default PSK Entropy |