lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 4 Mar 2019 08:21:33 -0600
From: Ryan Delaney <>
Subject: [FD] Sagemcom router insufficient default PSK entropy

# Exploit Title: Sagemcom router insufficient default PSK entropy
# Date: 4-3-2019
# Exploit Author: Ryan Delaney
# Author Contact:
# Author LinkedIn:
# Vendor Homepage:
# Software Link: N/A
# Version: 0.4.39
# Tested on: 0.4.39
# CVE: CVE-2019-9555

1. Description

Sagemcom F@st 5260 routers on firmware version 0.4.39 (and possibly
others), in WPA mode, default to using a PSK that is generated from a
2-part wordlist of known values and a nonce with insufficient entropy. The
number of possible PSKs is about 1.78 billion, which is too small.

2. Wordlist / PoC

A txt file has been created that contains every possible default PSK. It
contains ~1.78 billion entries and is about 23.4 GB uncompressed.
A 582 MB compressed 7z archive containing this txt file is available here:

3. Mitigation

Change the default PSK key to a more secure key with greater entropy.

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists