LANCOM Systems GmbH Information for VU#228519

Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse

Status

Affected

Vendor Statement

We have become aware of the flaw early this week on Monday October the 16th and will present our patches on Friday October 20.

LANCOM has deliver the following statement:
https://www.lancom-systems.com/service-support/instant-help/general-safety-information/

We have been able to launch our security packages:
https://www2.lancom.de/kb.nsf/ac96860327f38e46c12572660046f099/bd86ff5908078296c12581bf004c0b23?OpenDocument

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

https://www.lancom-systems.com/service-support/instant-help/general-safety-information/
https://www2.lancom.de/kb.nsf/ac96860327f38e46c12572660046f099/bd86ff5908078296c12581bf004c0b23?OpenDocument

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.