Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:10673
HistoryDec 16, 2005 - 12:00 a.m.

[SA18047] Avaya Wireless Access Points Static WEP Key Authentication Bypass

2005-12-1600:00:00
vulners.com
13

TITLE:
Avaya Wireless Access Points Static WEP Key Authentication Bypass

SECUNIA ADVISORY ID:
SA18047

VERIFY ADVISORY:
http://secunia.com/advisories/18047/

CRITICAL:
Moderately critical

IMPACT:
Security Bypass

WHERE:
>From remote

OPERATING SYSTEM:
Avaya Wireless Access Points (AP 3-6) 2.x
http://secunia.com/product/6524/
Avaya Wireless Access Points (AP 7-8) 2.x
http://secunia.com/product/6525/
Avaya Wireless Access Points (AP 7-8) 3.x
http://secunia.com/product/6526/

DESCRIPTION:
Urmas Kahar and Tarmo Kaljumae have reported a security issue in
Avaya Wireless Access Points products, which can be exploited by
malicious people to bypass certain security restrictions.

The problem is caused due to the presence of a static WEP key set to
"12345". This can be exploited to bypass the 802.1x authentication
process.

Successful exploitation allows access to network resources.

The security issue affects the following products:

  • Avaya Wireless Access Points AP-3, AP-4, AP-5, and AP-6 (All
    versions after 2.5 to 2.5.4)
  • Avaya Wireless Access Points AP-7 and AP-8 (All versions after 2.5
    and prior to 3.1)

SOLUTION:
Avaya Wireless AP-3:
Apply Software Update 2.5.5 for AP3.
http://support.avaya.com/japple/css/japple?temp.documentID=280939&temp.productID=107770&temp.bucketID=108025&PAGE=Document

Avaya Wireless AP-4, 5, and 6:
Apply Software Update 2.5.5 for AP4, 5, and 6.
http://support.avaya.com/japple/css/japple?temp.documentID=280948&temp.productID=107770&temp.bucketID=108025&PAGE=Document

Avaya Wireless AP-7:
Apply Software Update 3.1 for AP7.
http://support.avaya.com/japple/css/japple?temp.documentID=280946&temp.productID=107770&temp.bucketID=108025&PAGE=Document

Avaya Wireless AP-8:
Apply Software Update 2.5.5 for AP4, 5, and 6.
http://support.avaya.com/japple/css/japple?temp.documentID=280948&temp.productID=107770&temp.bucketID=108025&PAGE=Document

PROVIDED AND/OR DISCOVERED BY:
Urmas Kahar and Tarmo Kaljumae

ORIGINAL ADVISORY:
http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.