ID

VAR-201906-0411


CVE

CVE-2019-6972


TITLE

TP-Link TL-WR1043ND Vulnerabilities related to certificate and password management in devices

Trust: 0.8

sources: JVNDB: JVNDB-2019-005611

DESCRIPTION

An issue was discovered on TP-Link TL-WR1043ND V2 devices. The credentials can be easily decoded and cracked by brute-force, WordList, or Rainbow Table attacks. Specifically, credentials in the "Authorization" cookie are encoded with URL encoding and base64, leading to easy decoding. Also, the username is cleartext, and the password is hashed with the MD5 algorithm (after decoding of the URL encoded string with base64). TP-Link TL-WR1043ND The device contains vulnerabilities related to certificate and password management.Information may be obtained. The TP-LinkTL-WR1043ND is a wireless router from China Unicom (TP-Link). An encryption problem vulnerability exists in TP-LinkTL-WR1043NDV2. The vulnerability stems from the fact that the network system or product does not properly use the relevant cryptographic algorithm. The vulnerability can be exploited by an attacker to cause content to be incorrectly encrypted, weakly encrypted, and plaintext storage sensitive information. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components

Trust: 2.25

sources: NVD: CVE-2019-6972 // JVNDB: JVNDB-2019-005611 // CNVD: CNVD-2019-18863 // VULHUB: VHN-158407

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-18863

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-wr1043ndscope:eqversion:2.0

Trust: 1.0

vendor:tp linkmodel:tl-wr1043ndscope:eqversion:2

Trust: 0.8

vendor:tp linkmodel:tl-wr1043ndscope:eqversion:v2

Trust: 0.6

sources: CNVD: CNVD-2019-18863 // JVNDB: JVNDB-2019-005611 // NVD: CVE-2019-6972

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6972
value: HIGH

Trust: 1.0

NVD: CVE-2019-6972
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-18863
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201906-729
value: HIGH

Trust: 0.6

VULHUB: VHN-158407
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6972
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-18863
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-158407
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6972
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-18863 // VULHUB: VHN-158407 // JVNDB: JVNDB-2019-005611 // CNNVD: CNNVD-201906-729 // NVD: CVE-2019-6972

PROBLEMTYPE DATA

problemtype:CWE-326

Trust: 1.1

problemtype:CWE-255

Trust: 0.9

sources: VULHUB: VHN-158407 // JVNDB: JVNDB-2019-005611 // NVD: CVE-2019-6972

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201906-729

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201906-729

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-005611

PATCH

title:Top Pageurl:https://www.tp-link.com/us/

Trust: 0.8

sources: JVNDB: JVNDB-2019-005611

EXTERNAL IDS

db:NVDid:CVE-2019-6972

Trust: 3.1

db:JVNDBid:JVNDB-2019-005611

Trust: 0.8

db:CNNVDid:CNNVD-201906-729

Trust: 0.7

db:CNVDid:CNVD-2019-18863

Trust: 0.6

db:VULHUBid:VHN-158407

Trust: 0.1

sources: CNVD: CNVD-2019-18863 // VULHUB: VHN-158407 // JVNDB: JVNDB-2019-005611 // CNNVD: CNNVD-201906-729 // NVD: CVE-2019-6972

REFERENCES

url:https://twitter.com/malfuzzer/status/1141269335685652480?s=19

Trust: 2.5

url:https://github.com/malfuzzer/vulnerability-research/blob/master/tl-wr1043nd%20v2%20-%20tp-link/tl-wr1043nd_poc.pdf

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-6972

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6972

Trust: 0.8

sources: CNVD: CNVD-2019-18863 // VULHUB: VHN-158407 // JVNDB: JVNDB-2019-005611 // CNNVD: CNNVD-201906-729 // NVD: CVE-2019-6972

SOURCES

db:CNVDid:CNVD-2019-18863
db:VULHUBid:VHN-158407
db:JVNDBid:JVNDB-2019-005611
db:CNNVDid:CNNVD-201906-729
db:NVDid:CVE-2019-6972

LAST UPDATE DATE

2024-11-23T21:37:14.607000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-18863date:2019-06-23T00:00:00
db:VULHUBid:VHN-158407date:2020-08-24T00:00:00
db:JVNDBid:JVNDB-2019-005611date:2019-06-24T00:00:00
db:CNNVDid:CNNVD-201906-729date:2020-10-28T00:00:00
db:NVDid:CVE-2019-6972date:2024-11-21T04:47:20.153

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-18863date:2019-06-20T00:00:00
db:VULHUBid:VHN-158407date:2019-06-19T00:00:00
db:JVNDBid:JVNDB-2019-005611date:2019-06-24T00:00:00
db:CNNVDid:CNNVD-201906-729date:2019-06-19T00:00:00
db:NVDid:CVE-2019-6972date:2019-06-19T15:15:11.093