Description
Mesh OS before 7.9.1.1 on Tropos wireless mesh routers does not use a sufficient source of entropy for SSH keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
Published: 2012-12-18
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Tropos Networks has released customer notification and an update (Tropos Mesh OS 7.9.1.1) for its network device embedded software. This update can be downloaded from the Tropos software download page. Download of the update requires a valid user name and password. The updated firmware fixes the vulnerability by using sufficient entropy to generate unique SSH host keys.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2012-4823 Mesh OS before 7.9.1.1 on Tropos wireless mesh routers does not use a sufficient source of entropy for SSH keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
History

Wed, 09 Jul 2025 16:45:00 +0000

Type Values Removed Values Added
Title Tropos Wireless Mesh Routers Insufficient Entropy
References

Subscriptions

Tropos 1310 Distrubution Automation Mesh Router 1410 Mesh Router 1410 Wireless Mesh Router 3310 Indoor Mesh Router 3320 Indoor Mesh Router 4310 Mobile Mesh Router 6310 Mesh Router 6320 Mesh Router Mesh Os
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-07-09T16:22:48.905Z

Reserved: 2012-09-12T00:00:00.000Z

Link: CVE-2012-4898

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-12-18T12:30:05.920

Modified: 2025-07-09T17:15:29.767

Link: CVE-2012-4898

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses