Vulnerability Description
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Autopi | Wi-Fi\/Nb Firmware | < 2019-10-15 |
| Autopi | Wi-Fi\/Nb | - |
| Autopi | 4G\/Lte Firmware | < 2019-10-15 |
| Autopi | 4G\/Lte | - |
Related Weaknesses (CWE)
References
- http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdfExploitThird Party Advisory
- https://www.kth.se/nse/research/software-systems-architecture-and-security/Third Party Advisory
- https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v
- http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdfExploitThird Party Advisory
- https://www.kth.se/nse/research/software-systems-architecture-and-security/Third Party Advisory
- https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v
FAQ
What is CVE-2019-12941?
CVE-2019-12941 is a vulnerability with a CVSS score of 9.8 (CRITICAL). AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the devic...
How severe is CVE-2019-12941?
CVE-2019-12941 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-12941?
Check the references section above for vendor advisories and patch information. Affected products include: Autopi Wi-Fi\/Nb Firmware, Autopi Wi-Fi\/Nb, Autopi 4G\/Lte Firmware, Autopi 4G\/Lte.