Advisories: note incorrect mitigation in COMMSOPE FAQ

This commit is contained in:
vanhoefm 2021-05-17 05:41:16 +04:00 committed by GitHub
parent 1bc7636768
commit c92e56825f
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -12,7 +12,7 @@ Pull requests with additional links are welcome! Or create an issue on GitHub to
## C
- [Cisco](https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-wifi-faf-22epcEWu.html)
- COMMSCOPE: [Link 1](https://www.commscope.com/fragattacks-commscope-ruckus-resource-center/wifi-fragattacks-what-you-need-to-know/), [Link 2](https://www.commscope.com/globalassets/digizuite/916169-faq-security-advisory-id-20210511-v1-0.pdf)
- COMMSCOPE: [Link 1](https://www.commscope.com/fragattacks-commscope-ruckus-resource-center/wifi-fragattacks-what-you-need-to-know/), [Link 2](https://www.commscope.com/globalassets/digizuite/916169-faq-security-advisory-id-20210511-v1-0.pdf). Claim in their [FAQ](https://www.commscope.com/fragattacks-commscope-ruckus-resource-center/faqs/) that using EAP-TLS makes attack harder is **[incorrect](https://www.fragattacks.com/#eaptls)**.
- [Cypress](https://community.cypress.com/t5/Security-Bulletin/Potential-Fragmentation-Vulnerabilities-for-Wi-Fi-Devices/ba-p/276441)
## D