Insufficient Cookie Encryption on Linksys Router Raises Security Concerns
CVE-2019-7311

7.8HIGH

Key Information:

Vendor
Linksys
Vendor
CVE Published:
6 June 2019

Summary

A security issue has been identified in Linksys WRT1900ACS devices where the admin password is stored in cleartext within the 'admin-auth' cookie without proper encryption. This flawed storage mechanism allows local attackers to recover the admin password either by intercepting the network traffic during login or through physical access to the victim's computer shortly after an administrative session. Without adequate protection for sensitive authentication data, the risk of unauthorized administrative access to the router significantly increases.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.