{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T02:16:42.383","vulnerabilities":[{"cve":{"id":"CVE-2012-4898","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2012-12-18T12:30:05.920","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Mesh OS before 7.9.1.1 on Tropos wireless mesh routers does not use a sufficient source of entropy for SSH keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere."},{"lang":"es","value":"Mesh OS antes de v7.9.1.1 en los routers Tropos inalámbricos no utilizan una fuente suficiente de entropía para claves SSH, lo que hace que sea más fácil para atacantes man-in-the-middle falsificar un dispositivo o modificar un flujo de datos cliente-servidor mediante el aprovechamiento de conocimiento de una clave de una instalación del producto en otros lugares."}],"metrics":{"cvssMetricV2":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:P/A:N","baseScore":6.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":7.8,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:P/A:N","baseScore":6.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":7.8,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-310"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tropos:mesh_os:*:*:*:*:*:*:*:*","versionEndIncluding":"7.9.1","matchCriteriaId":"3E8693B2-5D42-46A1-9994-42E5BADCAB75"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:tropos:1310_distrubution_automation_mesh_router:-:*:*:*:*:*:*:*","matchCriteriaId":"A7852E70-8D02-482E-95FB-2E0CA77E17B4"},{"vulnerable":true,"criteria":"cpe:2.3:h:tropos:1410_mesh_router:-:*:*:*:*:*:*:*","matchCriteriaId":"E27A596C-9AB4-47FB-8CC1-A442AE2B166B"},{"vulnerable":true,"criteria":"cpe:2.3:h:tropos:1410_wireless_mesh_router:-:*:*:*:*:*:*:*","matchCriteriaId":"A03DF812-5697-4216-B34A-68F862258BB4"},{"vulnerable":true,"criteria":"cpe:2.3:h:tropos:3310_indoor_mesh_router:-:*:*:*:*:*:*:*","matchCriteriaId":"FB430981-1D88-4C92-BC7E-A6AFA1525A76"},{"vulnerable":true,"criteria":"cpe:2.3:h:tropos:3320_indoor_mesh_router:-:*:*:*:*:*:*:*","matchCriteriaId":"2B9E51A6-A559-4113-A7C6-EE3C7DF1B5EE"},{"vulnerable":true,"criteria":"cpe:2.3:h:tropos:4310_mobile_mesh_router:-:*:*:*:*:*:*:*","matchCriteriaId":"668A0BBA-9F67-4E63-A2CE-7A114B42E58F"},{"vulnerable":true,"criteria":"cpe:2.3:h:tropos:6310_mesh_router:-:*:*:*:*:*:*:*","matchCriteriaId":"9E564CC3-C509-428D-AEB4-8F100ECFF0B3"},{"vulnerable":true,"criteria":"cpe:2.3:h:tropos:6320_mesh_router:-:*:*:*:*:*:*:*","matchCriteriaId":"0FA11508-E41A-431A-9386-7D8A95C0D8D6"}]}]}],"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-12-297-01","source":"ics-cert@hq.dhs.gov"},{"url":"http://www.us-cert.gov/control_systems/pdf/ICSA-12-297-01.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]}]}}]}