Categories: US-Cert-Repository

Multiple Vulnerabilities in WPA3 Protocol



Original release date: April 12, 2019

The CERT Coordination Center (CERT/CC) has released information on vulnerabilities—referred to as Dragonblood—in WPA3 protocol. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review CERT/CC’s Vulnerability Note VU#871675 for more information and refer to vendors for appropriate updates, when available.


This product is provided subject to this Notification and this Privacy & Use policy.



Source link

admin

Share
Published by
admin

Recent Posts

Continuing Threats to Home Users

Systems Affected   Continuing Threats to Home Users View Previous Alerts Alert (SA04-079A) Continuing Threats…

21 hours ago

Cross-Domain Vulnerability in Outlook Express MHTML Protocol Handler

Systems Affected   Microsoft Windows systems   Overview   A cross-domain vulnerability in the Outlook…

2 days ago

Summary of Windows Security Updates for April 2004

Systems Affected   Systems running Microsoft Windows   Overview   There are multiple vulnerabilities in…

3 days ago

Multiple Vulnerabilities in Microsoft Products

Systems Affected   Microsoft Windows Operating Systems Microsoft Windows Remote Procedure Call (RPC) and Distributed…

4 days ago

Cisco IOS SNMP Message Handling Vulnerability

Systems Affected Cisco routers and switches running vulnerable versions of IOS. Vulnerable IOS versions known…

5 days ago

Vulnerabilities in TCP

Systems Affected Systems that rely on persistent TCP connections, for example routers supporting BGP Overview…

6 days ago

This website uses cookies.