CVE-2019-9555

Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small.
References
Link Resource
https://seclists.org/fulldisclosure/2019/Mar/12 Mitigation Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sagemcom:f\@st_5260_firmware:0.4.39:*:*:*:*:*:*:*
cpe:2.3:h:sagemcom:f\@st_5260:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-03-05 23:29

Updated : 2023-12-10 12:59


NVD link : CVE-2019-9555

Mitre link : CVE-2019-9555

CVE.ORG link : CVE-2019-9555


JSON object : View

Products Affected

sagemcom

  • f\@st_5260
  • f\@st_5260_firmware
CWE
CWE-331

Insufficient Entropy