Current Description
An issue was discovered on Mimosa Client Radios before 2.2.3. In the device's web interface, there is a page that allows an attacker to use an unsanitized GET parameter to download files from the device as the root user. The attacker can download any file from the device's filesystem. This can be used to view unsalted, MD5-hashed administrator passwords, which can then be cracked, giving the attacker full admin access to the device's web interface. This vulnerability can also be used to view the plaintext pre-shared key (PSK) for encrypted wireless connections, or to view the device's serial number (which allows an attacker to factory reset the device).
Source:
MITRE
View Analysis Description
Analysis Description
An issue was discovered on Mimosa Client Radios before 2.2.3. In the device's web interface, there is a page that allows an attacker to use an unsanitized GET parameter to download files from the device as the root user. The attacker can download any file from the device's filesystem. This can be used to view unsalted, MD5-hashed administrator passwords, which can then be cracked, giving the attacker full admin access to the device's web interface. This vulnerability can also be used to view the plaintext pre-shared key (PSK) for encrypted wireless connections, or to view the device's serial number (which allows an attacker to factory reset the device).
Source:
MITRE
Severity
CVSS 3.x Severity and Metrics:
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.0 Severity and Metrics:
Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
Weakness Enumeration
CWE-ID |
CWE Name |
Source |
CWE-732 |
Incorrect Permission Assignment for Critical Resource |
NIST
|
CWE-522 |
Insufficiently Protected Credentials |
NIST
|
CWE-327 |
Use of a Broken or Risky Cryptographic Algorithm |
NIST
|
Change History
2 change records found
- show changes
CWE Remap -
10/2/2019 8:03:26 PM
Action |
Type |
Old Value |
New Value |
Changed |
CWE |
CWE-200
|
CWE-732
CWE-327
CWE-522
|
Initial Analysis -
5/26/2017 9:21:58 AM
Action |
Type |
Old Value |
New Value |
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:mimosa:backhaul_radios:2.2.1:*:*:*:*:*:*:* (and previous)
*cpe:2.3:o:mimosa:client_radios:2.2.1:*:*:*:*:*:*:* (and previous) |
Added |
CVSS V2 |
|
(AV:N/AC:L/Au:N/C:C/I:N/A:N) |
Added |
CVSS V3 |
|
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Added |
CWE |
|
CWE-200 |
Changed |
Reference Type |
http://blog.iancaling.com/post/160596244178 No Types Assigned |
http://blog.iancaling.com/post/160596244178 Third Party Advisory |