From c92e56825fe7572a27ae6fc006f3776866728ed5 Mon Sep 17 00:00:00 2001 From: vanhoefm Date: Mon, 17 May 2021 05:41:16 +0400 Subject: [PATCH] Advisories: note incorrect mitigation in COMMSOPE FAQ --- ADVISORIES.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ADVISORIES.md b/ADVISORIES.md index 2a2866ae6..63baaedc7 100644 --- a/ADVISORIES.md +++ b/ADVISORIES.md @@ -12,7 +12,7 @@ Pull requests with additional links are welcome! Or create an issue on GitHub to ## C - [Cisco](https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-wifi-faf-22epcEWu.html) -- COMMSCOPE: [Link 1](https://www.commscope.com/fragattacks-commscope-ruckus-resource-center/wifi-fragattacks-what-you-need-to-know/), [Link 2](https://www.commscope.com/globalassets/digizuite/916169-faq-security-advisory-id-20210511-v1-0.pdf) +- COMMSCOPE: [Link 1](https://www.commscope.com/fragattacks-commscope-ruckus-resource-center/wifi-fragattacks-what-you-need-to-know/), [Link 2](https://www.commscope.com/globalassets/digizuite/916169-faq-security-advisory-id-20210511-v1-0.pdf). Claim in their [FAQ](https://www.commscope.com/fragattacks-commscope-ruckus-resource-center/faqs/) that using EAP-TLS makes attack harder is **[incorrect](https://www.fragattacks.com/#eaptls)**. - [Cypress](https://community.cypress.com/t5/Security-Bulletin/Potential-Fragmentation-Vulnerabilities-for-Wi-Fi-Devices/ba-p/276441) ## D