First published: Tue Sep 13 2022(Updated: )
Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and earlier communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network access to capture the hashed password of a logged on user and use it in a classic Pass-the-Hash style attack.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn531g3 Firmware | <=m31g3.v5030.200325 | |
Wavlink WN531G3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40621 is a vulnerability in the WAVLINK Quantum D4G (WN531G3) firmware that allows an attacker to capture hashed passwords due to the lack of HTTPS communication and a weak hashing mechanism.
CVE-2022-40621 allows an attacker with sufficient network access to capture hashed passwords on the WAVLINK Quantum D4G (WN531G3) due to insecure HTTP communication and a weak hashing mechanism.
CVE-2022-40621 has a severity rating of 7.5 (High).
An attacker can attempt to crack the captured hashed passwords to gain unauthorized access to user accounts and sensitive information.
To mitigate CVE-2022-40621, ensure that the WAVLINK Quantum D4G (WN531G3) firmware is updated to version M31G3.V5030.200325 or later, and enable HTTPS communication to protect password hashes.