WPS
E484057
WPS (Wi-Fi Protected Setup) is a wireless network security standard designed to simplify the process of connecting devices to a Wi-Fi network, but it is widely known for serious security vulnerabilities that make it susceptible to brute-force attacks.
Statements (47)
| Predicate | Object |
|---|---|
| instanceOf |
Wi‑Fi configuration protocol
ⓘ
wireless network security standard ⓘ |
| abbreviationFor | Wi‑Fi Protected Setup NERFINISHED ⓘ |
| associatedWith |
Wi‑Fi access points
ⓘ
Wi‑Fi client devices ⓘ Wi‑Fi routers ⓘ |
| configurationMethod |
PIN entry on client or router web interface
ⓘ
physical push button on router ⓘ software push button in router management interface ⓘ |
| criticizedFor |
inadequate protection against brute‑force attempts
ⓘ
weak default security design ⓘ |
| designedFor |
home wireless networks
ⓘ
small office wireless networks ⓘ |
| developedBy | Wi‑Fi Alliance NERFINISHED ⓘ |
| fullName | Wi‑Fi Protected Setup ⓘ |
| hasComponent |
access point acting as registrar or proxy registrar
ⓘ
enrollee device ⓘ registrar ⓘ |
| impact |
led many router manufacturers to add options to disable WPS
ⓘ
prompted security advisories from vendors and researchers ⓘ |
| introducedBy | Wi‑Fi Alliance in 2006 ⓘ |
| protocolProperty |
exchanges configuration data between access point and client
ⓘ
operates at link‑layer configuration level ⓘ |
| purpose |
simplify Wi‑Fi security configuration for end users
ⓘ
simplify connecting devices to Wi‑Fi networks ⓘ |
| recommendedAction |
disable WPS on routers for better security
ⓘ
use strong WPA2 or WPA3 passphrases instead of WPS ⓘ |
| relatedTo |
WPA
NERFINISHED
ⓘ
WPA2 NERFINISHED ⓘ Wi‑Fi security ⓘ |
| securityRecommendationFromExperts |
avoid using WPS PIN method
ⓘ
prefer manual Wi‑Fi configuration over WPS ⓘ |
| securityRisk |
allows attackers to recover WPA or WPA2 passphrase
ⓘ
can enable unauthorized access to Wi‑Fi networks ⓘ reduces overall security of WPA/WPA2 when enabled ⓘ |
| standardizedIn | Wi‑Fi Alliance specification for Wi‑Fi Protected Setup ⓘ |
| status | widely considered insecure ⓘ |
| supports |
automatic configuration of WPA security
ⓘ
automatic configuration of WPA2 security ⓘ |
| uses |
PIN method
ⓘ
USB configuration method ⓘ near‑field communication method ⓘ push‑button configuration method ⓘ |
| vulnerability |
design flaw in 8‑digit PIN validation
ⓘ
information leakage through protocol responses ⓘ offline PIN guessing attacks ⓘ susceptible to brute‑force attacks on the PIN ⓘ |
Referenced by (1)
Full triples — surface form annotated when it differs from this entity's canonical label.