Lucene search

K
cve[email protected]CVE-2011-5053
HistoryJan 06, 2012 - 8:55 p.m.

CVE-2011-5053

2012-01-0620:55:01
CWE-287
web.nvd.nist.gov
21
cve-2011-5053
wi-fi protected setup
wps
pin authentication
nvd
security vulnerability

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.2 High

AI Score

Confidence

Low

0.041 Low

EPSS

Percentile

92.2%

The Wi-Fi Protected Setup (WPS) protocol, when the “external registrar” authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.

Affected configurations

NVD
Node
wi-fiwifi_protected_setup_protocol

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.2 High

AI Score

Confidence

Low

0.041 Low

EPSS

Percentile

92.2%

Related for CVE-2011-5053