Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.108292 |
Categoría: | General |
Título: | Multiple AVM FRITZ!Box WPA2 Key Reinstallation Vulnerabilities - KRACK |
Resumen: | WPA2 as used in several models of the AVM FRITZ!Box are prone to; multiple security weaknesses aka Key Reinstallation Attacks (KRACK). |
Descripción: | Summary: WPA2 as used in several models of the AVM FRITZ!Box are prone to multiple security weaknesses aka Key Reinstallation Attacks (KRACK). Affected Software/OS: AVM FRITZ!Box 7590, 7580, 7560 and 7490 with a firmware below 6.92, if configured to access the internet provided by another router via wireless LAN uplink. Solution: Update the firmware to version 6.92 or later. CVSS Score: 5.8 CVSS Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
BugTraq ID: 101274 Common Vulnerability Exposure (CVE) ID: CVE-2017-13077 Common Vulnerability Exposure (CVE) ID: CVE-2017-13078 Common Vulnerability Exposure (CVE) ID: CVE-2017-13079 Common Vulnerability Exposure (CVE) ID: CVE-2017-13080 Common Vulnerability Exposure (CVE) ID: CVE-2017-13081 Common Vulnerability Exposure (CVE) ID: CVE-2017-13082 Common Vulnerability Exposure (CVE) ID: CVE-2017-13084 Common Vulnerability Exposure (CVE) ID: CVE-2017-13086 Common Vulnerability Exposure (CVE) ID: CVE-2017-13087 Common Vulnerability Exposure (CVE) ID: CVE-2017-13088 |
Copyright | Copyright (C) 2017 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |