Skip to content

Latest commit

 

History

History
70 lines (70 loc) · 1.67 KB

CWE-1392.md

File metadata and controls

70 lines (70 loc) · 1.67 KB

Ubee DDW365 devices have predictable default WPA2 PSKs that could lead to unauthorized remote access.

A remote attacker (in proximity to a Wi-Fi network) can derive the default WPA2-PSK value by observing a beacon frame. WIFI PSK are generated by using the 1st 6 characters of the SSID + the last 6 of the BSSID, decrementing the last digit.


[Vulnerability Type Other] CWE-1392: Use of Default Credentials


[Vendor of Product] Ubee


[Affected Product Code Base]

Arris Wireless Cable Modem's - Model: Ubee DDW365


[Affected Component]

Ubee DDW365 devices have predictable default WPA2 security passwords that could lead to unauthorized remote access.


[Attack Type] Context-dependent


[Impact Denial of Service] true


[Impact Escalation of Privileges]

true


[Impact Information Disclosure]

true


[Attack Vectors]

An attacker can scan for SSID & BSSIDs in proximity (or use a WarDriving Tool) & predict default Wi-Fi passwords.


[Reference]

https://github.com/actuator/cve/blob/main/Ubee/DDW365-I.jpg

https://github.com/actuator/cve/blob/main/Ubee/DDW365-II.jpg


[Discoverer] Edward Warren