CVE-2024-23726

Ubee DDW365 XCNDDW365 devices have predictable default WPA2 PSKs that could lead to unauthorized remote access. A remote attacker (in proximity to a Wi-Fi network) can derive the default WPA2-PSK value by observing a beacon frame. A PSK is generated by using the first six characters of the SSID and the last six of the BSSID, decrementing the last digit.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:ubeeinteractive:ddw365:-:*:*:*:*:*:*:*
cpe:2.3:o:ubeeinteractive:ddw365_firmware:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-01-21 04:15

Updated : 2024-01-29 15:25


NVD link : CVE-2024-23726

Mitre link : CVE-2024-23726

CVE.ORG link : CVE-2024-23726


JSON object : View

Products Affected

ubeeinteractive

  • ddw365
  • ddw365_firmware
CWE
CWE-798

Use of Hard-coded Credentials