The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.
References
Configurations
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://code.google.com/p/reaver-wps/ - | |
References | () http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf - | |
References | () http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/ - | |
References | () http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20120111-wps - | |
References | () http://www.kb.cert.org/vuls/id/723755 - US Government Resource | |
References | () http://www.us-cert.gov/cas/techalerts/TA12-006A.html - US Government Resource |
Information
Published : 2012-01-06 20:55
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5053
Mitre link : CVE-2011-5053
CVE.ORG link : CVE-2011-5053
JSON object : View
Products Affected
wi-fi
- wifi_protected_setup_protocol
CWE
CWE-287
Improper Authentication