Description
SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 use the same hardcoded encryption key across different customers' installations, which allows attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-3417 | SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 use the same hardcoded encryption key across different customers' installations, which allows attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation. |
References
| Link | Providers |
|---|---|
| http://www.kb.cert.org/vuls/id/822980 |
|
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T23:24:48.518Z
Reserved: 2016-02-12T00:00:00.000Z
Link: CVE-2016-2333
No data.
Status : Modified
Published: 2016-04-25T18:59:04.183
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-2333
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD