Vulnerability Description
SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 use the same hardcoded encryption key across different customers' installations, which allows attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Systech | Syslink Sl-1000 Modular Gateway | - |
| Systech | Syslink Sl-1000 Modular Gateway Firmware | - |
Related Weaknesses (CWE)
References
- http://www.kb.cert.org/vuls/id/822980Third Party AdvisoryUS Government Resource
- http://www.kb.cert.org/vuls/id/822980Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2016-2333?
CVE-2016-2333 is a vulnerability with a CVSS score of 7.5 (HIGH). SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 use the same hardcoded encryption key across different customers' installations, which allows attackers to d...
How severe is CVE-2016-2333?
CVE-2016-2333 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2333?
Check the references section above for vendor advisories and patch information. Affected products include: Systech Syslink Sl-1000 Modular Gateway, Systech Syslink Sl-1000 Modular Gateway Firmware.