20 lines
792 B
JSON
Raw Normal View History

{
"id": "CVE-2024-23726",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-21T04:15:19.353",
"lastModified": "2024-01-21T04:15:19.353",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Ubee DDW365 XCNDDW365 and DDW366 XCNDXW3WB devices have predictable default WPA2 PSKs that could lead to unauthorized remote access. A remote attacker (in proximity to a Wi-Fi network) can derive the default WPA2-PSK value by observing a beacon frame. A PSK is generated by using the first six characters of the SSID and the last six of the BSSID, decrementing the last digit."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/Ubee/CWE-1392.md",
"source": "cve@mitre.org"
}
]
}