Description
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.
Published: 2012-07-26
Score: 5.0 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2012-3830 AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.
History

No history.

Subscriptions

Airdroid Airdroid
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-17T03:33:02.767Z

Reserved: 2012-07-10T00:00:00.000Z

Link: CVE-2012-3886

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-07-26T22:55:01.793

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-3886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses