Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-4823 | Mesh OS before 7.9.1.1 on Tropos wireless mesh routers does not use a sufficient source of entropy for SSH keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere. |
Solution
Tropos Networks has released customer notification and an update (Tropos Mesh OS 7.9.1.1) for its network device embedded software. This update can be downloaded from the Tropos software download page. Download of the update requires a valid user name and password. The updated firmware fixes the vulnerability by using sufficient entropy to generate unique SSH host keys.
Workaround
No workaround given by the vendor.
Wed, 09 Jul 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Tropos Wireless Mesh Routers Insufficient Entropy | |
| References |
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-07-09T16:22:48.905Z
Reserved: 2012-09-12T00:00:00Z
Link: CVE-2012-4898
No data.
Status : Deferred
Published: 2012-12-18T12:30:05.920
Modified: 2025-07-09T17:15:29.767
Link: CVE-2012-4898
No data.
OpenCVE Enrichment
No data.
EUVD