Ubee DDW365 XCNDDW365 and DDW366 XCNDXW3WB devices have...
High severity
Unreviewed
Published
Jan 21, 2024
to the GitHub Advisory Database
•
Updated Feb 7, 2024
Description
Published by the National Vulnerability Database
Jan 21, 2024
Published to the GitHub Advisory Database
Jan 21, 2024
Last updated
Feb 7, 2024
Ubee DDW365 XCNDDW365 and DDW366 XCNDXW3WB devices have predictable default WPA2 PSKs that could lead to unauthorized remote access. A remote attacker (in proximity to a Wi-Fi network) can derive the default WPA2-PSK value by observing a beacon frame. A PSK is generated by using the first six characters of the SSID and the last six of the BSSID, decrementing the last digit.
References