サポート
お知らせ
サポート情報検索
FAQ・マニュアル・ファームウェア/ドライバー
検索
製品カテゴリー一覧
スイッチ
ルーター
メディアコンバーター
VDSL / HomePNA
無線LAN
Voice/Video
HUB
ネットワークマネージメント・ソフトウェア
LANアダプター
トランシーバー
ソフトウェア
アクセサリー
TELESYN Series

Extreme Networks
Juniper Networks
アイコム
Sitara Networks
LANアダプター・ドライバーダウンロード
サービス提供のご案内
販売終了製品一覧
サポートセンター受付窓口
セキュリティ・脆弱性について

Vulnerability of handshake traffic on Wi-Fi Protected Access II (WPA2)

Allied Telesis K.K.
Release 2017.10.19
Updated 2018.05.08

Japanese Page (日本語ページ) >
 Wireless products have possibility of WPA2 vulnerability.

 1) Summary

    Wi-Fi Protected Access II (WPA2) contains multiple vulnerabilities.
    Mainly they affect the WPA2 Client, however some vulnerabilities also related to the AP side.


 2) Target Products

    Wireless products (Including Partner Products)
    
    2-1) Affected

         MWS AP Series (since version 2.0.0)

        - AT-MWS600AP
        - AT-MWS900AP
        - AT-MWS1750AP 
        - AT-MWS2533AP


    2-2) Not Affected

         TQ Series (All version)

        - AT-TQ2403
        - AT-TQ2403EX
        - AT-TQ2450
        - AT-TQ3200
        - AT-TQ3400
        - AT-TQ3600
        - AT-TQ4400
        - AT-TQ4400e
        - AT-TQ4600

         UWC Series

        - AT-UWC
        - AT-UWC-APL

         Extricom Products


 3) Impact

    Wireless products connected by using WPA2 possiblity of being attacked.
    Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, and so on.
    These attacks will cause information leakage.


 4) Workarounds

    You can avoid this vulnerability with the following workarounds.

    MWS AP Series

    4-1) Disabling Fast Roaming

    4-2) Firmware upgrade

          On AT-MWS600AP, AT-MWS1750AP and AT-MWS2533AP,
          this issue has fixed in version after 2.2.3.
     On AT-MWS900AP it has fixed in version after 2.0.2.





PAGE TOP