WPS

E484057

WPS (Wi-Fi Protected Setup) is a wireless network security standard designed to simplify the process of connecting devices to a Wi-Fi network, but it is widely known for serious security vulnerabilities that make it susceptible to brute-force attacks.

Try in SPARQL Jump to: Statements Referenced by

Statements (47)

Predicate Object
instanceOf Wi‑Fi configuration protocol
wireless network security standard
abbreviationFor Wi‑Fi Protected Setup NERFINISHED
associatedWith Wi‑Fi access points
Wi‑Fi client devices
Wi‑Fi routers
configurationMethod PIN entry on client or router web interface
physical push button on router
software push button in router management interface
criticizedFor inadequate protection against brute‑force attempts
weak default security design
designedFor home wireless networks
small office wireless networks
developedBy Wi‑Fi Alliance NERFINISHED
fullName Wi‑Fi Protected Setup
hasComponent access point acting as registrar or proxy registrar
enrollee device
registrar
impact led many router manufacturers to add options to disable WPS
prompted security advisories from vendors and researchers
introducedBy Wi‑Fi Alliance in 2006
protocolProperty exchanges configuration data between access point and client
operates at link‑layer configuration level
purpose simplify Wi‑Fi security configuration for end users
simplify connecting devices to Wi‑Fi networks
recommendedAction disable WPS on routers for better security
use strong WPA2 or WPA3 passphrases instead of WPS
relatedTo WPA NERFINISHED
WPA2 NERFINISHED
Wi‑Fi security
securityRecommendationFromExperts avoid using WPS PIN method
prefer manual Wi‑Fi configuration over WPS
securityRisk allows attackers to recover WPA or WPA2 passphrase
can enable unauthorized access to Wi‑Fi networks
reduces overall security of WPA/WPA2 when enabled
standardizedIn Wi‑Fi Alliance specification for Wi‑Fi Protected Setup
status widely considered insecure
supports automatic configuration of WPA security
automatic configuration of WPA2 security
uses PIN method
USB configuration method
near‑field communication method
push‑button configuration method
vulnerability design flaw in 8‑digit PIN validation
information leakage through protocol responses
offline PIN guessing attacks
susceptible to brute‑force attacks on the PIN

Referenced by (1)

Full triples — surface form annotated when it differs from this entity's canonical label.