Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
AOC CU34G2X monitor review
TeamGroup CX2 1TB SATA3 SSD review
EVGA GeForce RTX 3070 FTW3 Ultra review
Corsair 5000D PC Chassis Review
NZXT Kraken X63 RGB Review
ASUS Radeon RX 6900 XT STRIX OC LC Review
TerraMaster F5-221 NAS Review
MSI Radeon RX 6800 XT Gaming X TRIO Review
Sapphire Radeon RX 6800 NITRO+ review
Corsair HS70 Bluetooth Headset Review

New Downloads
Prime95 download version 30.4 build 7
AIDA64 Download Version 6.32.5620 beta
3DMark Download v2.16.7117 + Time Spy
Crystal DiskMark 8.0.1 Download
Corsair Utility Engine Download (iCUE) Download v3.37.140
ReShade download v4.9.1
GeForce 461.09 WHQL driver download
Intel HD graphics Driver Download Version: DCH 27.20.100.9126
HWiNFO Download v6.41–4345 Beta
MSI Afterburner 4.6.3 Beta 4 Download


New Forum Topics
Failed/Bad Asrock Phantom Radeon 6800? New GPU or wait? Intels new CEO Pat Gelsinger welcome package is valued at $116 million Radeon Adrenalin Edition 20.12.1 driver download & disccussion NVIDIA and AMD Graphics card shortages to last thoughout H1 2021 Does a really good silent video card exist? Samsung Introduces Consumer SATA SSD Series, the 870 EVO Nvidia Reflex Re-Applying Thermal Paste Works Wonders My experience with 4-way Sli thus far




Guru3D.com » News » Wi-Fi Protected Setup PIN Brute Force Vulnerability

Wi-Fi Protected Setup PIN Brute Force Vulnerability

by Hilbert Hagedoorn on: 12/30/2011 12:38 PM | source: | 0 comment(s)

A researcher has discovered a security hole in WPS technology that affects millions of Wi-Fi routers around the world.
A few weeks ago I decided to take a look at the Wi-Fi Protected Setup (WPS) technology. I noticed a few really bad design decisions which enable an efficient brute force attack, thus effectively breaking the security of pretty much all WPS-enabled Wi-Fi routers. As all of the more recent router models come with WPS enabled by default, this affects millions of devices worldwide.

I reported this vulnerability to CERT/CC and provided them with a list of (confirmed) affected vendors. CERT/CC has assigned VU#723755 (will be released today) to this issue. To my knowledge none of the vendors have reacted and released firmware with mitigations in place.







« Intel DZ77RE comes with Thunderbolt · Wi-Fi Protected Setup PIN Brute Force Vulnerability · LG 84-inch with 4K resolution TV at CES 2012 »


Guru3D.com © 2021