CVE-2012-4898
18.12.2012, 12:30
Mesh OS before 7.9.1.1 on Tropos wireless mesh routers does not use a sufficient source of entropy for SSH keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.Enginsight
Vendor | Product | Version |
---|---|---|
tropos | mesh_os | 𝑥 ≤ 7.9.1 |
tropos | 1310_distrubution_automation_mesh_router | - |
tropos | 1410_mesh_router | - |
tropos | 1410_wireless_mesh_router | - |
tropos | 3310_indoor_mesh_router | - |
tropos | 3320_indoor_mesh_router | - |
tropos | 4310_mobile_mesh_router | - |
tropos | 6310_mesh_router | - |
tropos | 6320_mesh_router | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration