About the security content of the AirPort 4.2 update

This article has been archived and is no longer updated by Apple.

This document describes the security content of AirPort 4.2, which can be downloaded and installed using Software Update, or from Apple Downloads.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How To Use The Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates."

AirPort 4.2

    CVE-ID: CAN-2005-2196

    Available for: Mac OS X v10.3.3 through Mac OS X v10.3.9, and Mac OS X v10.4.2

    Impact: Mobile users with the original AirPort Card enabled could automatically associate to an unsecure network.

    Description: When not associated with a known or trusted network, the original AirPort Card connects to a randomly generated network with a default WEP key. This can allow mobile users to automatically associate with untrusted networks without warning. This does not affect AirPort Express Cards, which currently ship in systems. This update addresses the issue by selecting a randomly-generated 128-bit WEP key. Credit to Dino Dai Zovi for reporting this issue.

Published Date: Oct 7, 2016