CVE-2011-5053 (GCVE-0-2011-5053)
Vulnerability from cvelistv5 – Published: 2012-01-06 20:00 – Updated: 2024-08-07 00:23
VLAI?
Summary
The Wi-Fi Protected Setup (WPS) protocol, when the "external registrar" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Date Public ?
2011-12-27 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:39.735Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://code.google.com/p/reaver-wps/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf"
},
{
"name": "VU#723755",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/723755"
},
{
"name": "TA12-006A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA12-006A.html"
},
{
"name": "20120111 Wi-Fi Protected Setup PIN Brute Force Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20120111-wps"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-12-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The Wi-Fi Protected Setup (WPS) protocol, when the \"external registrar\" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-10-06T09:00:00.000Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://code.google.com/p/reaver-wps/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf"
},
{
"name": "VU#723755",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/723755"
},
{
"name": "TA12-006A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA12-006A.html"
},
{
"name": "20120111 Wi-Fi Protected Setup PIN Brute Force Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20120111-wps"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2011-5053",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Wi-Fi Protected Setup (WPS) protocol, when the \"external registrar\" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://code.google.com/p/reaver-wps/",
"refsource": "MISC",
"url": "http://code.google.com/p/reaver-wps/"
},
{
"name": "http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/",
"refsource": "MISC",
"url": "http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/"
},
{
"name": "http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf",
"refsource": "MISC",
"url": "http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf"
},
{
"name": "VU#723755",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/723755"
},
{
"name": "TA12-006A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA12-006A.html"
},
{
"name": "20120111 Wi-Fi Protected Setup PIN Brute Force Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20120111-wps"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2011-5053",
"datePublished": "2012-01-06T20:00:00.000Z",
"dateReserved": "2012-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-07T00:23:39.735Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2011-5053",
"date": "2026-04-24",
"epss": "0.26201",
"percentile": "0.96311"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wi-fi:wifi_protected_setup_protocol:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D2A3134-0F55-472C-BC79-D5F0C24CFC81\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The Wi-Fi Protected Setup (WPS) protocol, when the \\\"external registrar\\\" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.\"}, {\"lang\": \"es\", \"value\": \"El protocolo WPS (Wi-Fi Protected Setup), cuando se utiliza el m\\u00e9todo de autenticaci\\u00f3n \\\"external registrar\\\", no informa adecuadamente a los clientes sobre los fallos de autenticaci\\u00f3n de PIN, lo que facilita a los atacantes remotos a la hora de descubrir el valor del PIN, y por lo tanto descubrir la contrase\\u00f1a de red de la Wifi o de reconfigurar un punto de acceso, mediante la lectura de mensajes EAP-NACK.\"}]",
"id": "CVE-2011-5053",
"lastModified": "2024-11-21T01:33:30.960",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:N\", \"baseScore\": 5.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2012-01-06T20:55:01.233",
"references": "[{\"url\": \"http://code.google.com/p/reaver-wps/\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20120111-wps\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/723755\", \"source\": \"cret@cert.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA12-006A.html\", \"source\": \"cret@cert.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://code.google.com/p/reaver-wps/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20120111-wps\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/723755\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA12-006A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}]",
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-5053\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2012-01-06T20:55:01.233\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Wi-Fi Protected Setup (WPS) protocol, when the \\\"external registrar\\\" authentication method is used, does not properly inform clients about failed PIN authentication, which makes it easier for remote attackers to discover the PIN value, and consequently discover the Wi-Fi network password or reconfigure an access point, by reading EAP-NACK messages.\"},{\"lang\":\"es\",\"value\":\"El protocolo WPS (Wi-Fi Protected Setup), cuando se utiliza el m\u00e9todo de autenticaci\u00f3n \\\"external registrar\\\", no informa adecuadamente a los clientes sobre los fallos de autenticaci\u00f3n de PIN, lo que facilita a los atacantes remotos a la hora de descubrir el valor del PIN, y por lo tanto descubrir la contrase\u00f1a de red de la Wifi o de reconfigurar un punto de acceso, mediante la lectura de mensajes EAP-NACK.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wi-fi:wifi_protected_setup_protocol:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D2A3134-0F55-472C-BC79-D5F0C24CFC81\"}]}]}],\"references\":[{\"url\":\"http://code.google.com/p/reaver-wps/\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/\",\"source\":\"cret@cert.org\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20120111-wps\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/723755\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA12-006A.html\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://code.google.com/p/reaver-wps/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20120111-wps\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/723755\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA12-006A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…