Логотип exploitDog
bind:CVE-2011-5053
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-5053

Количество 3

Количество 3

nvd логотип

CVE-2011-5053

около 14 лет назад

The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.

CVSS2: 5.8
EPSS: Средний
github логотип

GHSA-qm3r-59g5-w8vh

больше 3 лет назад

The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.

EPSS: Средний
fstec логотип

BDU:2015-10982

около 14 лет назад

Уязвимость протокола WPS, позволяющая нарушителю получить WPA PSK-ключ

CVSS2: 5.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2011-5053

The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.

CVSS2: 5.8
32%
Средний
около 14 лет назад
github логотип
GHSA-qm3r-59g5-w8vh

The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.

32%
Средний
больше 3 лет назад
fstec логотип
BDU:2015-10982

Уязвимость протокола WPS, позволяющая нарушителю получить WPA PSK-ключ

CVSS2: 5.8
32%
Средний
около 14 лет назад

Уязвимостей на страницу