In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
weidmueller ie-wl-bl-ap-cl-eu_firmware |
||
weidmueller ie-wlt-bl-ap-cl-eu_firmware |
||
weidmueller ie-wl-bl-ap-cl-us_firmware |
||
weidmueller ie-wlt-bl-ap-cl-us_firmware |
||
weidmueller ie-wl-vl-ap-br-cl-eu_firmware |
||
weidmueller ie-wlt-vl-ap-br-cl-eu_firmware |
||
weidmueller ie-wl-vl-ap-br-cl-us_firmware |
||
weidmueller ie-wlt-vl-ap-br-cl-us_firmware |