TITLE: Avaya Wireless Access Points Static WEP Key Authentication Bypass SECUNIA ADVISORY ID: SA18047 VERIFY ADVISORY: http://secunia.com/advisories/18047/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Avaya Wireless Access Points (AP 3-6) 2.x http://secunia.com/product/6524/ Avaya Wireless Access Points (AP 7-8) 2.x http://secunia.com/product/6525/ Avaya Wireless Access Points (AP 7-8) 3.x http://secunia.com/product/6526/ DESCRIPTION: Urmas Kahar and Tarmo Kaljumae have reported a security issue in Avaya Wireless Access Points products, which can be exploited by malicious people to bypass certain security restrictions. The problem is caused due to the presence of a static WEP key set to "12345". This can be exploited to bypass the 802.1x authentication process. Successful exploitation allows access to network resources. The security issue affects the following products: * Avaya Wireless Access Points AP-3, AP-4, AP-5, and AP-6 (All versions after 2.5 to 2.5.4) * Avaya Wireless Access Points AP-7 and AP-8 (All versions after 2.5 and prior to 3.1) SOLUTION: Avaya Wireless AP-3: Apply Software Update 2.5.5 for AP3. http://support.avaya.com/japple/css/japple?temp.documentID=280939&temp.productID=107770&temp.bucketID=108025&PAGE=Document Avaya Wireless AP-4, 5, and 6: Apply Software Update 2.5.5 for AP4, 5, and 6. http://support.avaya.com/japple/css/japple?temp.documentID=280948&temp.productID=107770&temp.bucketID=108025&PAGE=Document Avaya Wireless AP-7: Apply Software Update 3.1 for AP7. http://support.avaya.com/japple/css/japple?temp.documentID=280946&temp.productID=107770&temp.bucketID=108025&PAGE=Document Avaya Wireless AP-8: Apply Software Update 2.5.5 for AP4, 5, and 6. http://support.avaya.com/japple/css/japple?temp.documentID=280948&temp.productID=107770&temp.bucketID=108025&PAGE=Document PROVIDED AND/OR DISCOVERED BY: Urmas Kahar and Tarmo Kaljumae ORIGINAL ADVISORY: http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------