Description
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
Published: 2019-10-14
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-4517 AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
History

No history.

Subscriptions

Autopi 4g\/lte 4g\/lte Firmware Wi-fi\/nb Wi-fi\/nb Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:32:55.589Z

Reserved: 2019-06-24T00:00:00.000Z

Link: CVE-2019-12941

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-14T18:15:10.387

Modified: 2024-11-21T04:23:52.177

Link: CVE-2019-12941

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses