CVE-2012-3886
Published Jul 26, 2012
Last updated 12 years ago
Overview
- Description
- AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:airdroid:airdroid:1.0.4:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18DA093A-2C50-4D62-A65B-CDB061CCA01D" } ], "operator": "OR" } ] } ]