{ "schema_version": "1.4.0", "id": "GHSA-jf8w-2pxr-j438", "modified": "2022-05-14T02:50:06Z", "published": "2022-05-14T02:50:06Z", "aliases": [ "CVE-2014-9408" ], "details": "Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 uses part of the MAC address as part of the RC4 setup key, which makes it easier for remote attackers to guess the key via a brute-force attack.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9408" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/129585/Ekahau-Real-Time-Location-System-RC4-Cipher-Stream-Reuse-Weak-Key-Derivation.html" }, { "type": "WEB", "url": "http://www.modzero.ch/advisories/MZ-14-01-Ekahau-RTLS.txt" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/534241/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/71674" } ], "database_specific": { "cwe_ids": [ "CWE-200" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-12-19T15:59:00Z" } }