A weakness in the WPA2 Wi-Fi Protocol has been discovered that attackers can use to read information on the wireless network that was previously assumed to be encrypted.
The following Common Vulnerabilities and Exposures (CVE) identifiers were assigned to track which products are affected by specific instantiations of our key reinstallation attack:
Details information about this is available at:
You need to be signed in and under a current maintenance contract to view premium knowledge articles.
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy Cookie Preference Center