Vulnerability Description
Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sagemcom | F\@St 5260 Firmware | 0.4.39 |
| Sagemcom | F\@St 5260 | - |
Related Weaknesses (CWE)
References
- https://seclists.org/fulldisclosure/2019/Mar/12Mailing ListMitigationThird Party Advisory
- https://seclists.org/fulldisclosure/2019/Mar/12Mailing ListMitigationThird Party Advisory
FAQ
What is CVE-2019-9555?
CVE-2019-9555 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number...
How severe is CVE-2019-9555?
CVE-2019-9555 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9555?
Check the references section above for vendor advisories and patch information. Affected products include: Sagemcom F\@St 5260 Firmware, Sagemcom F\@St 5260.