Lucene search

K
zdtRyan Delaney1337DAY-ID-32312
HistoryMar 06, 2019 - 12:00 a.m.

Sagemcom [email protected] 5260 Router Insufficient Default PSK Entropy Vulnerability

2019-03-0600:00:00
Ryan Delaney
0day.today
71

EPSS

0.001

Percentile

35.9%

Sagemcom [email protected] 5260 routers on firmware version 0.4.39 (and possibly others), in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small.

<!--
# Exploit Title: Sagemcom router insufficient default PSK entropy
# Exploit Author: Ryan Delaney
# Author Contact: [email protected]
# Author LinkedIn: https://www.linkedin.com/in/infosecrd/
# Vendor Homepage: https://www.sagemcom.com/
# Software Link: N/A
# Version: 0.4.39
# Tested on: 0.4.39
# CVE: CVE-2019-9555

1. Description

Sagemcom [email protected] 5260 routers on firmware version 0.4.39 (and possibly
others), in WPA mode, default to using a PSK that is generated from a
2-part wordlist of known values and a nonce with insufficient entropy. The
number of possible PSKs is about 1.78 billion, which is too small.

2. Wordlist / PoC

A txt file has been created that contains every possible default PSK. It
contains ~1.78 billion entries and is about 23.4 GB uncompressed.
A 582 MB compressed 7z archive containing this txt file is available here:
hxxps://drive[.]google[.]com/file/d/1PZ-enM6VO56tMzhl42OCPGpBiteSIVD-/view?usp=sharing

3. Mitigation

Change the default PSK key to a more secure key with greater entropy.
-->

#  0day.today [2019-03-07]  #

EPSS

0.001

Percentile

35.9%

Related for 1337DAY-ID-32312