CVE-2011-5053

Wi-fi Wifi Protected Setup Protocol - Authentication Bypass

Title source: rule
STIX 2.1

Description

The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.

Exploits (1)

exploitdb WORKING POC
by cheffner · textremotehardware
https://www.exploit-db.com/exploits/18291

References (6)

Core 6
Core References
US Government Resource third-party-advisory x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/723755
US Government Resource third-party-advisory x_refsource_cert
http://www.us-cert.gov/cas/techalerts/TA12-006A.html
Issue Tracking x_refsource_misc
http://code.google.com/p/reaver-wps/

Scores

EPSS 0.2554
EPSS Percentile 96.3%

Details

CWE
CWE-287
Status published
Products (1)
wi-fi/wifi_protected_setup_protocol
Published Jan 06, 2012
Tracked Since Feb 18, 2026