The Wi-Fi Protected Setup (WPS) implementation on Corega CG-WLR300GNV and CG-WLR300GNV-W devices does not restrict the number of PIN authentication attempts, which makes it easier for remote attackers to obtain network access via a brute-force attack.
References
Link | Resource |
---|---|
http://corega.jp/support/security/20160622_wlr300gnv.htm | Vendor Advisory |
http://jvn.jp/en/jp/JVN75028871/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000109 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jpcert
Published: 2016-06-25T21:00:00
Updated: 2016-06-25T21:57:01
Reserved: 2016-05-17T00:00:00
Link: CVE-2016-4824
JSON object: View
NVD Information
Status : Analyzed
Published: 2016-06-25T21:59:06.517
Modified: 2016-06-28T00:33:23.657
Link: CVE-2016-4824
JSON object: View
Redhat Information
No data.
CWE