AVM GmbH Information for VU#228519

Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse

Status

Affected

Vendor Statement

https://en.avm.de/service/current-security-notifications/

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

https://en.avm.de/service/current-security-notifications/

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.