CVE-2023-40039

An issue was discovered on ARRIS TG852G, TG862G, and TG1672G devices. A remote attacker (in proximity to a Wi-Fi network) can derive the default WPA2-PSK value by observing a beacon frame.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:arris:tg852g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arris:tg852g:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:arris:tg862g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arris:tg862g:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:arris:tg1672g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arris:tg1672g:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-09-11 07:15

Updated : 2023-09-13 14:30


NVD link : CVE-2023-40039

Mitre link : CVE-2023-40039

CVE.ORG link : CVE-2023-40039


JSON object : View

Products Affected

arris

  • tg852g_firmware
  • tg1672g
  • tg862g_firmware
  • tg862g
  • tg1672g_firmware
  • tg852g