First published: Tue Nov 20 2012(Updated: )
Belkin wireless routers Surf N150 Model F7D1301v1, N900 Model F9K1104v1, N450 Model F9K1105V2, and N300 Model F7D2301v1 generate a predictable default WPA2-PSK passphrase based on eight digits of the WAN MAC address, which allows remote attackers to access the network by sniffing the beacon frames.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Belkin N150 F9K1009 | =f7d1301v1 | |
Belkin N300 Firmware | =f7d2301v1 | |
Belkin N450 Wireless Router | =f9k1105v2 | |
Belkin N900 | =f9k1104v1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4366 is considered a high-severity vulnerability due to its potential to allow remote unauthorized access to networks.
To mitigate CVE-2012-4366, change the default WPA2-PSK passphrase to a strong, unique password not based on the MAC address.
CVE-2012-4366 affects several Belkin wireless routers, including the Surf N150, N300, N450, and N900 models.
CVE-2012-4366 allows remote access because the default WPA2-PSK passphrase is predictable and can be derived from the WAN MAC address.
Yes, your network is at risk if you have a vulnerable device and have not changed the default WPA2-PSK passphrase.