vendor:
Tesley CPVA 642 Router
by:
Matt O'Connor
5
CVSS
MEDIUM
Offline Dictionary Attack
327 (Use of a Broken or Risky Cryptographic Algorithm)
CWE
Product Name: Tesley CPVA 642 Router
Affected Version From: MAGNET0000000
Affected Version To: MAGNET0999999
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2016
Magnet Networks – Weak WPA-PSK passphrases used in Tesley CPVA 642 Router
The Tesley CPVA 642 routers supplied by Magnet Networks are vulnerable to an offline dictionary attack if the WPA-PSK handshake is obtained by an attacker. The WPA-PSK pass phrase has the following features: Starts with MAGNET0, Adds six random numerical digits, 1 million possible combinations ( MAGNET0000000 – MAGNET0999999 ). The entire keyspace can be generated using “mask processor” by ATOM, piping each letter out to its own file. Using a 1.4ghz i3 processor on a budget laptop, we were hitting 1,000 keys per second. The WPA-PSK handshake we used has the password MAGNET0349325 and was cracked within ~6 minutes.
Mitigation:
Change the default password to a more secure password, using a mix of letters, numbers and symbols.