WiFi Protected Setup (WPS) PIN authentication vulnerability
RISK: Medium Risk
TYPE: Security software and application - Security Software & Appliance
A vulnerability has been identified in WiFi Protected Setup (WPS), which can be exploited by malicious people to bypass security restrictions or cause a denial of service.
A design flaw that exists in the WPS specification for the PIN authentication significantly reduces the time required to brute force the entire PIN because it allows an attacker to know when the first half of the 8 digit PIN is correct. The lack of a proper lock out policy after a certain number of failed attempts to guess the PIN on some wireless routers makes this brute force attack that much more feasible.
An exploit code is publicly available.
Impact
- Denial of Service
- Security Restriction Bypass
System / Technologies affected
- Any wireless router devices provide WPS feature may affected.
Solutions
- Disable WPS.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with