WeFi 3.2.1.4.1, when diagnostic mode is enabled, stores (1) WEP, (2) WPA, and (3) WPA2 access-point keys in (a) ClientWeFiLog.dat, (b) ClientWeFiLog.bak, and possibly (c) a certain .inf file under %PROGRAMFILES%\WeFi\Users\, and uses cleartext for the ClientWeFiLog files, which allows local users to obtain sensitive information by reading these files.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://secunia.com/advisories/30966 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/493946/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43621 | vdb entry |
http://osvdb.org/51543 | vdb entry |
http://securityreason.com/securityalert/3987 | third party advisory |
http://www.securityfocus.com/archive/1/494026/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/30088 | vdb entry |