First published: Thu Oct 03 2024(Updated: )
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Draytek Vigor2620 Firmware | ||
Draytek Vigor2620l Firmware | ||
All of | ||
Draytek Vigor2915 Firmware | <4.4.5.3 | |
Draytek Vigor2915 Firmware | ||
All of | ||
Draytek Vigor2866ac Firmware | <4.4.5.2 | |
Draytek Vigor2866ac Firmware | ||
All of | ||
Draytek Vigor2766 Firmware | <4.4.5.3 | |
DrayTek Vigor2766 | ||
All of | ||
Draytek Vigor2865ac Firmware | <4.4.5.2 | |
Draytek Vigor2865L | ||
All of | ||
Draytek Vigor2765 Firmware | <4.4.5.3 | |
Draytek Vigor2765 Firmware | ||
All of | ||
Draytek Vigor2763ac Firmware | <4.4.5.3 | |
Draytek Vigor2763ac Firmware | ||
All of | ||
Draytek Vigor2135ac Firmware | <4.4.5.3 | |
Draytek Vigor2135ac Firmware | ||
All of | ||
Draytek Vigor166 Firmware | <4.2.7 | |
Draytek Vigor166 Firmware | ||
All of | ||
Any of | ||
Draytek Vigor1000b Firmware | <4.3.2.8 | |
Draytek Vigor1000b Firmware | >=4.4.0.0<4.4.3.1 | |
Draytek Vigor1000b Firmware | ||
All of | ||
Draytek Vigor165 Firmware | <4.2.7 | |
Draytek Vigor165 Firmware | ||
All of | ||
Any of | ||
Draytek Vigor3910 Firmware | <4.3.2.8 | |
Draytek Vigor3910 Firmware | >=4.4.0.0<4.4.3.1 | |
Draytek Vigor3910 Firmware | ||
All of | ||
Any of | ||
Draytek Vigor2962 Firmware | <4.3.2.8 | |
Draytek Vigor2962 Firmware | >=4.4.0.0<4.4.3.1 | |
Draytek Vigor2962 Firmware | ||
All of | ||
Draytek Vigor3912 Firmware | <4.3.6.1 | |
DrayTek Vigor3912 | ||
All of | ||
Draytek Vigorlte 200n | ||
Draytek Vigorlte200 Firmware | ||
All of | ||
Draytek Vigor2133vac Firmware | ||
Draytek Vigor2133n | ||
All of | ||
Draytek Vigor2762n Firmware | ||
Draytek Vigor2762n | ||
All of | ||
Draytek Vigor2832 Firmware | ||
Draytek Vigor2832 | ||
All of | ||
Draytek Vigor2860ac Firmware | ||
Draytek Vigor2860ac Firmware | ||
All of | ||
Draytek Vigor2862 Firmware | ||
Draytek Vigor2862n Firmware | ||
All of | ||
Draytek Vigor2925 Firmware | ||
DrayTek Vigor2925 | ||
All of | ||
Draytek Vigor2926 Firmware | ||
Draytek Vigor2926L | ||
All of | ||
DrayTek Vigor2952p Firmware | ||
Draytek Vigor2952 Firmware | ||
All of | ||
Draytek Vigor3220 Firmware | ||
Draytek Vigor3220 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41594 has been assessed as a moderate severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2024-41594, users should update the firmware of DrayTek Vigor310 devices to the latest available version that addresses this vulnerability.
The potential impacts of CVE-2024-41594 include the risk of unauthorized access to sensitive information facilitated by weaknesses in OpenSSL's PRNG.
CVE-2024-41594 specifically affects DrayTek Vigor310 devices running firmware versions up to 4.3.2.6.
Yes, CVE-2024-41594 can potentially be exploited remotely, allowing attackers to gain access to sensitive information.