ID CVE-2014-2716
Summary Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.
References
Vulnerable Configurations
  • cpe:2.3:a:ekahau:real-time_location_system_controller:6.0.5-final:*:*:*:*:*:*:*
    cpe:2.3:a:ekahau:real-time_location_system_controller:6.0.5-final:*:*:*:*:*:*:*
  • cpe:2.3:a:ekahau:activator:3:*:*:*:*:*:*:*
    cpe:2.3:a:ekahau:activator:3:*:*:*:*:*:*:*
  • cpe:2.3:o:ekahau:b4_staff_badge_tag_firmware:1.4.52:*:*:*:*:*:*:*
    cpe:2.3:o:ekahau:b4_staff_badge_tag_firmware:1.4.52:*:*:*:*:*:*:*
  • cpe:2.3:h:ekahau:b4_staff_badge_tag:5.7:*:*:*:*:*:*:*
    cpe:2.3:h:ekahau:b4_staff_badge_tag:5.7:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 09-10-2018 - 19:43)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:N/A:N
refmap via4
bid 71674
bugtraq 20141215 Vulnerabilities in Ekahau Real-Time Location Tracking System [MZ-14-01]
misc
Last major update 09-10-2018 - 19:43
Published 19-12-2014 - 15:59
Last modified 09-10-2018 - 19:43
Back to Top