Description
Use of default credentials vulnerability in MR-GM2 firmware Ver. 3.00.03 and earlier, and MR-GM3 (-D/-K/-S/-DK/-DKS/-M/-W) firmware Ver. 1.03.45 and earlier allows a network-adjacent unauthenticated attacker to intercept wireless LAN communication, when the affected product performs the communication without changing the pre-shared key from the factory-default configuration.
Published: 2023-10-11
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-49501 Use of default credentials vulnerability in MR-GM2 firmware Ver. 3.00.03 and earlier, and MR-GM3 (-D/-K/-S/-DK/-DKS/-M/-W) firmware Ver. 1.03.45 and earlier allows a network-adjacent unauthenticated attacker to intercept wireless LAN communication, when the affected product performs the communication without changing the pre-shared key from the factory-default configuration.
History

Wed, 18 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Mrl Mr-gm2 Mr-gm2 Firmware Mr-gm3-d Mr-gm3-d Firmware Mr-gm3-dks Mr-gm3-dks Firmware Mr-gm3-k Mr-gm3-k Firmware Mr-gm3-m Mr-gm3-m Firmware Mr-gm3-s Mr-gm3-s Firmware Mr-gm3-w Mr-gm3-w Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2024-09-18T18:12:54.973Z

Reserved: 2023-10-05T02:27:26.616Z

Link: CVE-2023-45194

cve-icon Vulnrichment

Updated: 2024-08-02T20:14:19.930Z

cve-icon NVD

Status : Modified

Published: 2023-10-11T01:15:08.837

Modified: 2024-11-21T08:26:31.473

Link: CVE-2023-45194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses