cve/2024/CVE-2024-40892.md

18 lines
1.1 KiB
Markdown
Raw Permalink Normal View History

2024-08-22 18:33:16 +00:00
### [CVE-2024-40892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40892)
![](https://img.shields.io/static/v1?label=Product&message=Box%20Software&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.979%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1391%20Use%20of%20Weak%20Credentials&color=brighgreen)
### Description
A weak credential vulnerability exists in Firewalla Box Software versions before 1.979. This vulnerability allows a physically close attacker to use the license UUID for authentication and provision SSH credentials over the Bluetooth Low-Energy (BTLE) interface. Once an attacker gains access to the LAN, they could log into the SSH interface using the provisioned credentials. The license UUID can be acquired through plain-text Bluetooth sniffing, reading the QR code on the bottom of the device, or brute-forcing the UUID (though this is less likely).
### POC
#### Reference
- https://www.labs.greynoise.io/grimoire/2024-08-20-bluuid-firewalla/
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub