SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 use the same hardcoded encryption key across different customers' installations, which allows attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.kb.cert.org/vuls/id/822980 | Third Party Advisory US Government Resource | 
| http://www.kb.cert.org/vuls/id/822980 | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 02:48
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.kb.cert.org/vuls/id/822980 - Third Party Advisory, US Government Resource | 
Information
                Published : 2016-04-25 18:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-2333
Mitre link : CVE-2016-2333
CVE.ORG link : CVE-2016-2333
JSON object : View
Products Affected
                systech
- syslink_sl-1000_modular_gateway_firmware
- syslink_sl-1000_modular_gateway
CWE
                
                    
                        
                        CWE-310
                        
            Cryptographic Issues
