Description
SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 use the same hardcoded encryption key across different customers' installations, which allows attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-3417 | SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 use the same hardcoded encryption key across different customers' installations, which allows attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation. |
References
| Link | Providers |
|---|---|
| http://www.kb.cert.org/vuls/id/822980 |
|
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T23:24:48.518Z
Reserved: 2016-02-12T00:00:00.000Z
Link: CVE-2016-2333
No data.
Status : Deferred
Published: 2016-04-25T18:59:04.183
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-2333
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD