ID

VAR-200212-0880


TITLE

Microsoft Windows XP Wireless LAN AP Information Disclosure Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2013-15340 // BID: 6312

DESCRIPTION

Windows XP settings automatically search for available access points (APs) when using a wireless LAN. IEEE 802.11b is currently the most widely used wireless transmission protocol, operating in the 2.4 GHz band, and can reach a transmission rate of up to 11 Mbps. Windows XP's wireless LAN does not fully check when accessing the access point. A remote attacker can use this vulnerability to configure its XP system to access the access point device and intercept the transmitted information. The Windows XP system uses a wireless LAN to automatically search for an access point. If the AP device cannot be found, the request is continuously sent until the connection is established. If a Windows XP system is configured to have the same SSID as the access point, Windows XP will not confirm that it is the correct access point and use WEP encryption to begin the transfer session. The information of the registered SSID can be obtained by intercepting the wireless LAN information by using a network sniffing tool. In addition, WEP already has some well-known vulnerabilities. Data encrypted with a 40-bit key can be brute-forced in a short period of time, and 104-bit encrypted data may be cracked within two weeks according to the report. For this so-called \"Rouge Access Point\" attack, only two-way authentication can be used to avoid: APs must authenticate users and users must authenticate APs. The EAP authentication protocol used in IEEE 802.1x can do this. An information disclosure vulnerability has been reported for systems using the IEEE 802.11b standard for wireless communications. An attacker can exploit this vulnerability to set up an AP with the same SSID (Service Set ID) of a previously configured AP. When the vulnerable system recognizes this malicious AP, it will then begin transmission of data. This can be exploited by an attacker to intercept and decrypt any transmissions received from a vulnerable system. Information obtained in this manner may be used to launch further, destructive attacks against a vulnerable system. ** Microsoft has stated that this issue is not platform specific. Rather, it is an issue with the IEEE 802.11b standard

Trust: 0.81

sources: CNVD: CNVD-2013-15340 // BID: 6312

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-15340

AFFECTED PRODUCTS

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:ieeemodel:802.11bscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2013-15340 // BID: 6312

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2013-15340
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2013-15340
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2013-15340

THREAT TYPE

network

Trust: 0.3

sources: BID: 6312

TYPE

Configuration Error

Trust: 0.3

sources: BID: 6312

EXTERNAL IDS

db:BIDid:6312

Trust: 0.9

db:CNVDid:CNVD-2013-15340

Trust: 0.6

sources: CNVD: CNVD-2013-15340 // BID: 6312

REFERENCES

url:http://marc.theaimsgroup.com/?l=bugtraq&m=103903773432467&w=2

Trust: 0.6

url:/archive/1/304414

Trust: 0.3

sources: CNVD: CNVD-2013-15340 // BID: 6312

CREDITS

Discovery of this vulnerability credited to Nobuo Miwa <n-miwa@lac.co.jp>.

Trust: 0.3

sources: BID: 6312

SOURCES

db:CNVDid:CNVD-2013-15340
db:BIDid:6312

LAST UPDATE DATE

2022-05-17T01:55:28.613000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-15340date:2013-12-19T00:00:00
db:BIDid:6312date:2002-12-04T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-15340date:2002-12-05T00:00:00
db:BIDid:6312date:2002-12-04T00:00:00