01642 06 11 11 Arrange Call

Default WPA2-PSK Derivation Vulnerability in ARRIS TG852G, TG862G, and TG1672G Devices

CVE-2023-40039 · CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2023-40039

An issue was discovered on ARRIS TG852G, TG862G, and TG1672G devices. A remote attacker (in proximity to a Wi-Fi network) can derive the default WPA2-PSK value by observing a beacon frame.

Learn more about our Network Penetration Testing.