Short Name |
APP:GTS-WAP-PASSDISC |
---|---|
Severity |
Minor |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
GlobalSunTech WAP Admin Password Disclosure |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against GlobalSunTech Wireless Access Points (WAPs). WISECOM GL2422AP-0T, D-Link DWL-900AP+ B1 version 2.1 and 2.2, ALLOY GL-2422AP-S, EUSSO GL2422-AP, and LINKSYS WAP11-V2.2 are vulnerable. Attackers can broadcast a maliciously crafted packet that causes WAPs to disclose sensitive information such as WAP type, WAP name, Admin username, and Admin password.
An information disclosure vulnerability has been discovered in GlobalSunTech access points. It has been reported that a remote attacker is able to retrieve sensitive information from vulnerable access points, including AP login credentials. Information gained by exploiting this vulnerability may allow an attacker to launch further attacks against the target network. It should be noted that this vulnerability was reported for a WISECOM GL2422AP-0T access point. Devices that use Global Sun Technology access points may be affected by this issue. It has been determined that D-Link DI-614+ and SMC Barricade 7004AWBR access points are not affected by this issue. It has been reported that Linksys WAP11-V2.2 is prone to this issue, but to a lesser extent.