[20029] in bugtraq

home help back first fref pref prev next nref lref last post

Re: RG-1000 802.11 Residential Gateway default WEP key disclosure

daemon@ATHENA.MIT.EDU (thomas lakofski)
Wed Apr 4 22:00:07 2001

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.LNX.4.31.0104041328350.10400-100000@io.88.net>
Date:         Wed, 4 Apr 2001 13:33:45 +0100
Reply-To: thomas lakofski <thomas@88.NET>
From: thomas lakofski <thomas@88.NET>
X-To:         Bill Arbaugh <waa@CS.UMD.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.SOL.4.21.0104022035070.6061-100000@laffytaffy.cs.umd.edu>

So, if I use a product which clearly states, in the instructions, that
the default password for WEP is set to a known value, and that this must be
changed, and I don't do this, it's the vendor's fault?

This 'vulnerability' beggars belief.

-thomas

On Mon, 2 Apr 2001, Bill Arbaugh wrote:

> Name:		RG-1000 default network name and WEP key exposure
>
> Product:	Orinoco RG-1000 (www.wavelan.com)
>
> Severity:	An attacker can determine the network name (SSID), and
> 		current WEP encryption key-- allowing unrestricted
> 		access to the LAN.

--
 Do what thou wilt shall be the whole of the Law.
                -- Aleister Crowley
gpg: pub 1024D/81FD4B43 sub 4096g/BB6D2B11=>p.nu/d
2B72 53DB 8104 2041 BDB4  F053 4AE5 01DF 81FD 4B43

home help back first fref pref prev next nref lref last post