lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CANwWu2EHmsjCe49xuwFJ16aNC=fNhQCpv4LXeDQrEskoLUBOQA@mail.gmail.com>
Date: Mon, 4 Mar 2019 08:21:33 -0600
From: Ryan Delaney <ryan.delaney@...sp.org>
To: fulldisclosure@...lists.org
Subject: [FD] Sagemcom router insufficient default PSK entropy

<!--
# Exploit Title: Sagemcom router insufficient default PSK entropy
# Date: 4-3-2019
# Exploit Author: Ryan Delaney
# Author Contact: ryan.delaney@...sp.org
# Author LinkedIn: https://www.linkedin.com/in/infosecrd/
# Vendor Homepage: https://www.sagemcom.com/
# Software Link: N/A
# Version: 0.4.39
# Tested on: 0.4.39
# CVE: CVE-2019-9555

1. Description

Sagemcom F@st 5260 routers on firmware version 0.4.39 (and possibly
others), in WPA mode, default to using a PSK that is generated from a
2-part wordlist of known values and a nonce with insufficient entropy. The
number of possible PSKs is about 1.78 billion, which is too small.

2. Wordlist / PoC

A txt file has been created that contains every possible default PSK. It
contains ~1.78 billion entries and is about 23.4 GB uncompressed.
A 582 MB compressed 7z archive containing this txt file is available here:
hxxps://drive[.]google[.]com/file/d/1PZ-enM6VO56tMzhl42OCPGpBiteSIVD-/view?usp=sharing

3. Mitigation

Change the default PSK key to a more secure key with greater entropy.
-->

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ