Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/104940 | Third Party Advisory VDB Entry |
| https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01 | Mitigation Third Party Advisory US Government Resource |
| https://www.exploit-db.com/exploits/45076/ | Exploit Third Party Advisory VDB Entry |
| http://www.securityfocus.com/bid/104940 | Third Party Advisory VDB Entry |
| https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01 | Mitigation Third Party Advisory US Government Resource |
| https://www.exploit-db.com/exploits/45076/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 03:41
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.securityfocus.com/bid/104940 - Third Party Advisory, VDB Entry | |
| References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01 - Mitigation, Third Party Advisory, US Government Resource | |
| References | () https://www.exploit-db.com/exploits/45076/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-08-01 18:29
Updated : 2024-11-21 03:41
NVD link : CVE-2018-10618
Mitre link : CVE-2018-10618
CVE.ORG link : CVE-2018-10618
JSON object : View
Products Affected
davolink
- dvw-3200n_firmware
- dvw-3200n
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort
