CVE-2011-5053

The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wi-fi:wifi_protected_setup_protocol:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:33

Type Values Removed Values Added
References () http://code.google.com/p/reaver-wps/ - () http://code.google.com/p/reaver-wps/ -
References () http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf - () http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf -
References () http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/ - () http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/ -
References () http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20120111-wps - () http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20120111-wps -
References () http://www.kb.cert.org/vuls/id/723755 - US Government Resource () http://www.kb.cert.org/vuls/id/723755 - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA12-006A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA12-006A.html - US Government Resource

Information

Published : 2012-01-06 20:55

Updated : 2024-11-21 01:33


NVD link : CVE-2011-5053

Mitre link : CVE-2011-5053

CVE.ORG link : CVE-2011-5053


JSON object : View

Products Affected

wi-fi

  • wifi_protected_setup_protocol
CWE
CWE-287

Improper Authentication