Unrated severityNVD Advisory· Published Nov 25, 2015· Updated May 6, 2026
CVE-2015-7286
CVE-2015-7286
Description
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 rely on a polyalphabetic substitution cipher with hardcoded keys, which makes it easier for remote attackers to defeat a cryptographic protection mechanism by capturing IP or V.22bis PSTN protocol traffic.
Affected products
2cpe:2.3:o:csl_dualcom:gprs_cs2300-r_firmware:1.25:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:csl_dualcom:gprs_cs2300-r_firmware:1.25:*:*:*:*:*:*:*
- cpe:2.3:o:csl_dualcom:gprs_cs2300-r_firmware:3.53:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- cybergibbons.comnvdExploit
- www.kb.cert.org/vuls/id/428280nvdThird Party AdvisoryUS Government Resource
- www.kb.cert.org/vuls/id/BLUU-A3NQALnvdThird Party AdvisoryUS Government Resource
News mentions
0No linked articles in our index yet.