WPA2 Key Reinstallation Attack (KRACK) vulnerabilities in Hirschmann BAT devices
■An attacker can force WPA1/WPA2-enabled wireless LAN devices into reinstalling the encryption key. This leads to nonce reuse and compromises the security of the underlying stream ciphers.
|
|
|
|
User's Guide |
|
|
|
Please see the document for details |
|
|
|
|
|
|
|
English Chinese Chinese and English Japanese |
|
June 6, 2018 |
|
Version: 1.1 |
|
BSECV-2017-16 |
|
60 KB |
- +1 Like
- Add to Favorites
Recommend
All reproduced articles on this site are for the purpose of conveying more information and clearly indicate the source. If media or individuals who do not want to be reproduced can contact us, which will be deleted.