An authentication weakness was identified in Omada Controllers, Gateways and Access Points, controller-device adoption due to improper handling of random values. Exploitation requires advanced network positioning and allows an attacker to intercept adoption traffic and forge valid authentication through offline precomputation, potentially exposing sensitive information and compromising confidentiality.
Metrics
Affected Vendors & Products
References
History
Thu, 22 Jan 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authentication weakness was identified in Omada Controllers, Gateways and Access Points, controller-device adoption due to improper handling of random values. Exploitation requires advanced network positioning and allows an attacker to intercept adoption traffic and forge valid authentication through offline precomputation, potentially exposing sensitive information and compromising confidentiality. | |
| Title | Authentication Weakness on Omada Controllers, Gateways and Access Points | |
| Weaknesses | CWE-760 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-01-22T23:14:45.823Z
Reserved: 2025-08-20T22:24:20.340Z
Link: CVE-2025-9290
No data.
Status : Received
Published: 2026-01-23T00:15:52.093
Modified: 2026-01-23T00:15:52.093
Link: CVE-2025-9290
No data.
OpenCVE Enrichment
No data.