Mesh OS before 7.9.1.1 on Tropos wireless mesh routers does not use a sufficient source of entropy for SSH keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
Advisories
Source ID Title
EUVD EUVD EUVD-2012-4823 Mesh OS before 7.9.1.1 on Tropos wireless mesh routers does not use a sufficient source of entropy for SSH keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
Fixes

Solution

Tropos Networks has released customer notification and an update (Tropos Mesh OS 7.9.1.1) for its network device embedded software. This update can be downloaded from the Tropos software download page. Download of the update requires a valid user name and password. The updated firmware fixes the vulnerability by using sufficient entropy to generate unique SSH host keys.


Workaround

No workaround given by the vendor.

History

Wed, 09 Jul 2025 16:45:00 +0000

Type Values Removed Values Added
Title Tropos Wireless Mesh Routers Insufficient Entropy
References

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-07-09T16:22:48.905Z

Reserved: 2012-09-12T00:00:00Z

Link: CVE-2012-4898

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-12-18T12:30:05.920

Modified: 2025-07-09T17:15:29.767

Link: CVE-2012-4898

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.