Toshiba Commerce Solutions Information for VU#228519

Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse

Status

Affected

Vendor Statement

Toshiba Global Commerce Solutions Information for VU#228519

    Wi-Fi Protected Access II (WPA2) handshake traffic can be manipulated to induce nonce and session key reuse

  • Date Notified: 15 Sept 2017
  • Statement Date: 15 October 2017
  • Date Updated:

    Status

    Affected

    Vendor Statement

    Toshiba Global Commerce Solutions (TGCS) has reviewed the subject VU#228519 across its full product line and has determined that our SureMark 4610 Printer (Models 1NR, 2CR, 2NR) with Wireless Lan Adapter is affected by this vulnerability. TGCS will release a Security Alert directly to entitled customers and business partners. To reduce the risk of an attack based on this vulnerability, we continue communicating with customers while not making this generally available to others who may have ill intent. With the information in the alert, the customer can determine their own level of risk.

    TGCS reminds their customers to update third party operating systems and wireless attachment cards for this vulnerability.

    Vendor Information

    Toshiba Global Commerce Solution Security Alerts are available in the Toshiba Commerce Portal at www.toshibacommerce.com. An Enterprise ID (EID) is required to access the alerts. If you do not have an EID, please complete the application at Apply for an Enterprise ID. A subscription service is also available. A subscriber will receive an email with a direct link, to quickly access a new alert. To subscribe to future alerts, please visit Notifications for directions. By subscribing to any of the Security Alert folders you consent to notification mailings to the email address associated with your Enterprise ID (EID). You can unsubscribe at any time by visiting Notifications and following the instructions.

    Vendor References

    http://www.toshibacommerce.com

    Addendum

    There are no additional comments at this time.

    Vendor Information

    We are not aware of further vendor information regarding this vulnerability.

    Vendor References

    https://tgcs04.toshibacommerce.com/cs/idcplg?IdcService=FLD_BROWSE&path=%2fCommunications%2fSecurity%20Alerts&doMarkSubscribed=1


http://www.toshibacommerce.com/
https://www.toshibacommerce.com/forms/anon/org/app/e8ee98aa-3101-4218-8ac3-1d50c734aa99/launch/index.html?form=F_Form1
https://www.toshibacommerce.com/wps/myportal/%21ut/p/a1/rZRNc8IgEIZ_Sw8eGQhJCDmmWr8abW2dqcnFoYQoTiDRRK399UXrrWOtUzgws7A87y6z88IUzmCq2U4uWCNLzYpjnJJ5-ExR_wnhYa-LAxTRid-j3UcHDTB8gylMuW6qZgkToVtoWSrRQlrs6-8dbEQhWC1MyKqNLABGDjlf1YJvN7I5AF4qtdWSn2TrI7J

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.