MEDIUM · 5.8

CVE-2011-5053

The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remot...

Vulnerability Description

The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.

CVSS Score

5.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
Wi-FiWifi Protected Setup ProtocolAll versions

Related Weaknesses (CWE)

References

FAQ

What is CVE-2011-5053?

CVE-2011-5053 is a vulnerability with a CVSS score of 5.8 (MEDIUM). The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remot...

How severe is CVE-2011-5053?

CVE-2011-5053 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2011-5053?

Check the references section above for vendor advisories and patch information. Affected products include: Wi-Fi Wifi Protected Setup Protocol.