Meross Smart Wi-Fi 2 Way Wall Switch (MSS550X), on its 3.1.3 version and before, creates an open Wi-Fi Access Point without the required security measures in its initial setup. This could allow a remote attacker to obtain the Wi-Fi SSID as well as the password configured by the user from Meross app via Http/JSON plain request.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 06:22
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.incibe.es/en/incibe-cert/notices/aviso/meross-mss550x-missing-encryption-sensitive-data - | |
| CVSS | v2 : v3 : | v2 : 4.3 v3 : 7.4 | 
20 Nov 2023, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
 | 
27 Oct 2022, 16:43
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-319 | 
09 Nov 2021, 15:29
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-11-05 21:15
Updated : 2024-11-21 06:22
NVD link : CVE-2021-3774
Mitre link : CVE-2021-3774
CVE.ORG link : CVE-2021-3774
JSON object : View
Products Affected
                meross
- mss550x_firmware
- mss550x
CWE
                
                    
                        
                        CWE-319
                        
            Cleartext Transmission of Sensitive Information
