Cisco Cisco WAP4410N Wireless-N Access Point - PoE Advanced Security Notas de publicación
2
Release Notes for WAP4410N Access Point Firmware Version 2.0.7.4
Release Notes
•
•
•
•
•
•
•
Changes Since WAP4410N Firmware Version 2.0.6.1
The firmware was updated and the following was fixed in firmware version 2.0.7.4.
•
CSCum37566—Undocumented Test Interface Unauthorized Access Vulnerability in
WAP4410N.
WAP4410N.
Changes Since WAP4410N Firmware Version 2.0.5.3
The firmware was updated and the following issues were fixed in firmware version 2.0.6.1.
•
CSCtx62203—In certain environments and traffic model, the WAP4410N may lockup
after some undetermined time. (A protection mechanism was added to guard against
sporadic problems with client association that could occur after six to 24 hours.) .
after some undetermined time. (A protection mechanism was added to guard against
sporadic problems with client association that could occur after six to 24 hours.) .
Known Issues
The following known issues exist for firmware version 2.0.6.1:
•
CSCtz79103—When selecting a 128-bit WEP key and providing a passphrase, one
128-bit key is generated. However, the default transmit key radio buttons allow you to
pick from keys 1 through 4. The radio buttons for keys 2, 3, and 4 should be disabled.
128-bit key is generated. However, the default transmit key radio buttons allow you to
pick from keys 1 through 4. The radio buttons for keys 2, 3, and 4 should be disabled.
•
CSCtz05386—When enabling IPv6, the link local is not displayed on the status page.
Workaround: SSH into the device and execute an ifconfig to determine the link local.
Workaround: SSH into the device and execute an ifconfig to determine the link local.