The WPS implementation on I-O DATA DEVICE WN-GDN/R3, WN-GDN/R3-C, WN-GDN/R3-S, and WN-GDN/R3-U devices does not limit PIN guesses, which allows remote attackers to obtain network access via a brute-force attack.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN25674893/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000061 | Vendor Advisory |
http://www.iodata.jp/support/information/2016/wn-gdnr3_bfa/ | Vendor Advisory |
http://jvn.jp/en/jp/JVN25674893/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000061 | Vendor Advisory |
http://www.iodata.jp/support/information/2016/wn-gdnr3_bfa/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN25674893/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2016-000061 - Vendor Advisory | |
References | () http://www.iodata.jp/support/information/2016/wn-gdnr3_bfa/ - Vendor Advisory |
Information
Published : 2016-05-14 16:59
Updated : 2024-11-21 02:45
NVD link : CVE-2016-1206
Mitre link : CVE-2016-1206
CVE.ORG link : CVE-2016-1206
JSON object : View
Products Affected
iodata
- wn-gdn\/r3-u
- wn-gdn\/r3_firmware
- wn-gdn\/r3
- wn-gdn\/r3-s
- wn-gdn\/r3-c
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor