First published: Wed Dec 27 2023(Updated: )
Arris DG860A and DG1670A devices have predictable default WPA2 PSKs that could lead to unauthorized remote access. (They use the first 6 characters of the SSID and the last 6 characters of the BSSID, decrementing the last digit.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Arris Dg860a Firmware | ||
Arris DG860A | ||
All of | ||
Arris Dg1670a Firmware | =ts0901203b6_020420_16xx.gw_pc20_tw | |
Arris Dg1670a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40038 is considered a medium severity vulnerability due to the potential for unauthorized remote access.
CVE-2023-40038 affects Arris DG860A and DG1670A devices, specifically those with predictable default WPA2 PSKs.
To mitigate CVE-2023-40038, users should change the default WPA2 PSK to a stronger, custom password that does not follow the predictable pattern.
The risks associated with CVE-2023-40038 include unauthorized remote access to the network, potentially allowing attackers to intercept or manipulate network traffic.
You can verify if your Arris device is vulnerable to CVE-2023-40038 by checking if it has the default WPA2 PSK setup as described in the vulnerability details.