CVE-2019-7311
Summary
| CVE | CVE-2019-7311 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-06-06 16:29:00 UTC |
| Updated | 2021-07-21 11:39:00 UTC |
| Description | An issue was discovered on Linksys WRT1900ACS 1.0.3.187766 devices. A lack of encryption in how the user login cookie (admin-auth) is stored on a victim's computer results in the admin password being discoverable by a local attacker, and usable to gain administrative access to the victim's router. The admin password is stored in base64 cleartext in an "admin-auth" cookie. An attacker sniffing the network at the time of login could acquire the router's admin password. Alternatively, gaining physical access to the victim's computer soon after an administrative login could result in compromise. |
Risk And Classification
Problem Types: CWE-311
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Linksys | Wrt1900acs | - | All | All | All |
| Hardware | Linksys | Wrt1900acs | - | All | All | All |
| Operating System | Linksys | Wrt1900acs Firmware | 1.0.3.187766 | All | All | All |
| Operating System | Linksys | Wrt1900acs Firmware | 1.0.3.187766 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Robot Security | MISC | robot-security.blogspot.com | Third Party Advisory |
| My First CVE- Linksys WRT 1300 ACS- CVE-2019-7311 – T0b0rx0r Blog! | MISC | www.x0rsecurity.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.