Description
Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and earlier communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network access to capture the hashed password of a logged on user and use it in a classic Pass-the-Hash style attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43895 | Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and earlier communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network access to capture the hashed password of a logged on user and use it in a classic Pass-the-Hash style attack. |
References
History
No history.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-09-17T02:01:24.046Z
Reserved: 2022-09-12T00:00:00.000Z
Link: CVE-2022-40621
No data.
Status : Modified
Published: 2022-09-13T21:15:10.133
Modified: 2024-11-21T07:21:43.593
Link: CVE-2022-40621
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD