WPS PIN Offline Brute-Force Exploit in Askey AP5100W Devices
CVE-2020-15023

5.9MEDIUM

Key Information:

Vendor

Askey

Vendor
CVE Published:
11 December 2020

What is CVE-2020-15023?

Askey AP5100W devices running AP5100W_Dual_SIG_1.01.097 are exposed to a vulnerability that allows attackers to execute offline brute-force attacks on the Wi-Fi Protected Setup (WPS) PIN. This weakness stems from inadequate random number generation during the Diffie-Hellman exchange, enabling the capture of WPS authentication attempts. By leveraging this captured information, an attacker can quickly derive the WPS PIN, and potentially the Wi-Fi Pre-Shared Key (PSK), granting them unauthorized access to the targeted Wi-Fi network.

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.