First published: Thu Jun 06 2019(Updated: )
An issue was discovered on Linksys WRT1900ACS 1.0.3.187766 devices. A lack of encryption in how the user login cookie (admin-auth) is stored on a victim's computer results in the admin password being discoverable by a local attacker, and usable to gain administrative access to the victim's router. The admin password is stored in base64 cleartext in an "admin-auth" cookie. An attacker sniffing the network at the time of login could acquire the router's admin password. Alternatively, gaining physical access to the victim's computer soon after an administrative login could result in compromise.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys Wrt1900acs Firmware | =1.0.3.187766 | |
Linksys WRT1900ACS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-7311.
The severity level of CVE-2019-7311 is high.
The vulnerability in CVE-2019-7311 allows a local attacker to discover the admin password and gain administrative access to Linksys WRT1900ACS routers.
The version 1.0.3.187766 of Linksys WRT1900ACS firmware is affected by CVE-2019-7311.
No, Linksys WRT1900ACS itself is not vulnerable to CVE-2019-7311.