vendor:
Verizon 4G LTE Network Extender
by:
LiquidWorm
7.5
CVSS
HIGH
Weak Credentials Algorithm
798
CWE
Product Name: Verizon 4G LTE Network Extender
Affected Version From: GA4.38
Affected Version To: V0.4.038.2131
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: lighttpd-web
2022
Verizon 4G LTE Network Extender – Weak Credentials Algorithm
Verizon's 4G LTE Network Extender is utilizing a weak default admin password generation algorithm. The password is generated using the last 4 values from the device's MAC address, which is disclosed on the main webUI login page to an unauthenticated attacker. The values are then concatenated with the string 'LTEFemto' resulting in something like 'LTEFemtoD080' as the default Admin password.
Mitigation:
Verizon should implement a stronger algorithm for generating default admin passwords and ensure that they are not easily guessable. Users should also be encouraged to change their default passwords upon installation.