CVE-2023-40039

An issue was discovered on ARRIS TG852G, TG862G, and TG1672G devices. A remote attacker (in proximity to a Wi-Fi network) can derive the default WPA2-PSK value by observing a beacon frame.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:arris:tg852g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arris:tg852g:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:arris:tg862g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arris:tg862g:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:arris:tg1672g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arris:tg1672g:-:*:*:*:*:*:*:*

History

26 Sep 2024, 16:35

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-11 07:15

Updated : 2024-09-26 16:35


NVD link : CVE-2023-40039

Mitre link : CVE-2023-40039


JSON object : View

Products Affected

arris

  • tg852g
  • tg862g
  • tg852g_firmware
  • tg1672g_firmware
  • tg1672g
  • tg862g_firmware