Please respond to the vulnerability of Broadcom Wi-Fi chipset. (CVE-2019-15126)

  • 1
  • Question
  • Updated 3 months ago
  • Answered

Hello?

Please respond to the vulnerability of Broadcom Wi-Fi chipset. (CVE-2019-15126)

Please check the link below for details of the vulnerability.
> https://nvd.nist.gov/vuln/detail/CVE-2019-15126

In this regard, our company needs documentation that the Access Point sold by Rukus is not related to the vulnerability of the Broadcom Wi-Fi chipset.

This document was requested by our government agency.

Or, please check what access point's Wi-Fi chipset is currently sold by Ruckus.

The Access Points we have are T310, T510, R510, R610.

I will wait for your reply.

Thank you very much.

Photo of Dawoon Lee

Dawoon Lee

  • 2 Posts
  • 0 Reply Likes

Posted 3 months ago

  • 1
Photo of Albert Pierson

Albert Pierson, Employee

  • 173 Posts
  • 149 Reply Likes
Hi Dawoon,

Please check the following KBA article:
000010204 - Kr00k - vulnerability

Kr00k – formally known as CVE-2019-15126, is a vulnerability in Broadcom and Cypress Wi-Fi chips that allows unauthorized decryption of some WPA2-encrypted traffic.

Since all Ruckus APs are 100% Atheros and hence not affected by the vulnerability.

This is also covered in Security Bulletin:

https://support.ruckuswireless.com/security_bulletins/303


I hope this answers your question.