Vulnerabilities in WPA and WPA2
- Summary
Multiple vulnerabilities have been identified that affect session key negotiation in both the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. The known vulnerabilities mainly affect WPA2 client devices, but some vulnerabilities may affect wireless infrastructure components such as Access Points.
- Target Products
Wireless products (including Partner Products)
- Affected
MWS AP Series (From version 2.0.0)
- AT-MWS600AP
AT-MWS900AP
AT-MWS1750AP
AT-MWS2533AP - Not Affected
TQ Series (all versions)
AT-TQ2403
AT-TQ2403EX
AT-TQ2450
AT-TQ3200
AT-TQ3400
AT-TQ3600
AT-TQ4400
AT-TQ4400e
AT-TQ4600 - UWC Series
AT-UWC
AT-UWC-APLExtricom products
- Affected
- Impact
Wireless products connected with the WPA and WPA2 protocols face the possibility of being attacked. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, and so on. These attacks will cause information leakage.
- Workarounds
You can avoid this vulnerability with the following workarounds:
MWS AP Series
4.1 Disabling Fast Roaming
4.2 Firmware upgrade - release date to be announced.