First published: Sat May 14 2016(Updated: )
The WPS implementation on I-O DATA DEVICE WN-GDN/R3, WN-GDN/R3-C, WN-GDN/R3-S, and WN-GDN/R3-U devices does not limit PIN guesses, which allows remote attackers to obtain network access via a brute-force attack.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Iodata Wn-gdn/r3 Firmware | ||
Iodata Wn-gdn/r3 | ||
Iodata Wn-gdn/r3-c | ||
Iodata WN-GDN/R3-S | ||
Iodata Wn-gdn/r3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1206 is considered a high-severity vulnerability due to its potential to allow unauthorized access to network devices via brute-force attacks.
To mitigate CVE-2016-1206, it is recommended to upgrade the firmware of affected I-O DATA DEVICE WN-GDN/R3 models to the latest version provided by the manufacturer.
CVE-2016-1206 affects I-O DATA DEVICE WN-GDN/R3, WN-GDN/R3-C, WN-GDN/R3-S, and WN-GDN/R3-U models.
CVE-2016-1206 allows unauthorized access by not limiting the number of PIN guesses, enabling attackers to perform brute-force attacks.
CVE-2016-1206 is a remote vulnerability, allowing attackers to exploit the weakness over the network.