First published: Mon Jan 01 2001(Updated: )
Lucent/ORiNOCO WaveLAN cards generate predictable Initialization Vector (IV) values for the Wireless Encryption Protocol (WEP) which allows remote attackers to quickly compile information that will let them decrypt messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Orinoco Wavelan | ||
Lucent Wavelan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2001-0160 is considered high due to its potential to allow remote attackers to decrypt sensitive information.
To fix CVE-2001-0160, it is recommended to upgrade to a version of the firmware or driver that addresses the predictable Initialization Vector issue.
CVE-2001-0160 affects Lucent WaveLAN and Orinoco WaveLAN cards, which use Wireless Encryption Protocol (WEP).
Remote attackers can execute prompting decrypting attacks due to the predictable Initialization Vectors generated by affected devices.
Yes, CVE-2001-0160 is critical for wireless security as it undermines the encryption provided by WEP, making data vulnerable to interception.