VAR-200804-0458

Vulnerability from variot - Updated: 2022-05-17 01:56

Both BT Home Hub and Speedtouch are home wireless Internet routers. The default WEP/WPA key algorithm used by BT Home Hub and Speedtouch routers is predictable, and remote attackers can predict keys based on some public information (such as MAC address or SSID) so that they can completely invade the router. For Speedtouch router router: S/N: CP0615JT109 (53) Delete CC and PP values: CP0615109 converts XXX value to hexadecimal: CP0615313039 through SHA-1 processing: 742da831d2b657fa53d347301ec610e1ebf8a3d0 converts the last 3 bytes into 6-byte characters The string, then added to SpeedTouch, becomes the default SSID: SpeedTouchF8A3D0 converts the first 5 bytes into a 10-byte string and becomes the default WEP/WPA key: 742DA831D2 for BT Home Hub, the only difference is Use the last 2 bytes of the SHA1 hash to get the SSID: S/N: CP0647EH6DM (BF) Delete CC and PP values: CP06476DM16 encoding XXX: CP064736444DSHA1 encryption: 06f48a28eba1ab896a396077d772fd65503b8df3 Default SSID: BTHomeHub-8DF3 default encryption key: 06f48a28eb. Multiple wireless routers are prone to a vulnerability that can allow an attacker to predict their default WEP/WPA encryption keys. Attackers can exploit this issue to bypass authentication to an affected device, which can allow them to completely compromise the device or to gain access to the private network

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200804-0458",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 0.6,
        "vendor": "no",
        "version": null
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "0"
      },
      {
        "model": "home hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bt",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kevin Devine",
    "sources": [
      {
        "db": "BID",
        "id": "28893"
      }
    ],
    "trust": 0.3
  },
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2008-2093",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "CNVD",
            "id": "CNVD-2008-2093",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Both BT Home Hub and Speedtouch are home wireless Internet routers. The default WEP/WPA key algorithm used by BT Home Hub and Speedtouch routers is predictable, and remote attackers can predict keys based on some public information (such as MAC address or SSID) so that they can completely invade the router. For Speedtouch router router: S/N: CP0615JT109 (53) Delete CC and PP values: CP0615109 converts XXX value to hexadecimal: CP0615313039 through SHA-1 processing: 742da831d2b657fa53d347301ec610e1ebf8a3d0 converts the last 3 bytes into 6-byte characters The string, then added to SpeedTouch, becomes the default SSID: SpeedTouchF8A3D0 converts the first 5 bytes into a 10-byte string and becomes the default WEP/WPA key: 742DA831D2 for BT Home Hub, the only difference is Use the last 2 bytes of the SHA1 hash to get the SSID: S/N: CP0647EH6DM (BF) Delete CC and PP values: CP06476DM16 encoding XXX: CP064736444DSHA1 encryption: 06f48a28eba1ab896a396077d772fd65503b8df3 Default SSID: BTHomeHub-8DF3 default encryption key: 06f48a28eb. Multiple wireless routers are prone to a vulnerability that can allow an attacker to predict their default WEP/WPA encryption keys. \nAttackers can exploit this issue to bypass authentication to an affected device, which can allow them to completely compromise the device or to gain access to the private network",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "db": "BID",
        "id": "28893"
      }
    ],
    "trust": 0.81
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "28893",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "id": "VAR-200804-0458",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      }
    ]
  },
  "last_update_date": "2022-05-17T01:56:45.983000Z",
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 0.6,
        "url": "http://marc.info/?l=bugtraq\u0026m=120890136725340\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://www.homehub.bt.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.gnucitizen.org/blog/default-key-algorithm-in-thomson-and-bt-home-hub-routers/"
      },
      {
        "trust": 0.3,
        "url": "http://www.thomson-broadband.co.uk/codepages/content.asp?c=1"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/491206"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-04-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "date": "2008-04-22T00:00:00",
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-01-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "date": "2008-04-23T16:47:00",
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "28893"
      }
    ],
    "trust": 0.3
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thomson SpeedTouch and BT Home Hub Router Default WEP/WPA Key Algorithm Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "28893"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…