An issue was discovered on ARRIS TG852G, TG862G, and TG1672G devices. A remote attacker (in proximity to a Wi-Fi network) can derive the default WPA2-PSK value by observing a beacon frame.
References
Link | Resource |
---|---|
https://github.com/actuator/cve/blob/main/Arris/CVE-2023-40039 | Third Party Advisory |
https://i.ebayimg.com/images/g/-UcAAOSwDe1kyD-Z/s-l1600.png | Product |
https://i.ebayimg.com/images/g/4P0AAOSwdhxkrZtt/s-l1600.jpg | Product |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2023-09-11 07:15
Updated : 2023-09-13 14:30
NVD link : CVE-2023-40039
Mitre link : CVE-2023-40039
CVE.ORG link : CVE-2023-40039
JSON object : View
Products Affected
arris
- tg852g_firmware
- tg1672g
- tg862g_firmware
- tg862g
- tg1672g_firmware
- tg852g
CWE