Conformance Test Results Report



Application Id 141 912
Time 1 753 927 661
Execution Batch Id 673 593 670 818 574
24GChannelPreferred 6
5GChannelPreferred 36
6GBandSupport False
6GChannelPreferred 37
ApiRetryCount 1
DebugLogLevel BASIC
UNII2BandSupport False
bandSelection 2.4GHz
dataPacketType ICMP
manualDutMode False
packetCount 10
packetPayloadSize 1000
packetTimeInterval 1
ssid QuickTrack_
ssidAppendingValue Apple
ssidEpochTime 1746658519
testSsidOption Default
toolMode Certification

softwareVersion 2.2.3.13
validatorBuildVersion 0.27.1-feature-157
validatorServiceVersion 23
role Station
supportSTAPhysicalDisplayPIN false
supportAPLablePIN false
5GChannelAlternate 44
supportSTAVirtualPushbutton false
supportSTAKeypadPIN false
apLabelPINCode 12345670
supportAPPhysicalDisplayPIN false
triggerBroadcastProtectedDisconnectFromGui false
supportAPKeypadPIN false
p2pWscMethod []
triggerUnicastProtectedDisconnectFromGui false
countryCodeTool [US]
24GChannelAlternate 1
supportSTAVirtualDisplayPIN false
wifiEnhancedOpenSupportedDhGroups [19]
staLabelPINCode 12345670
supportSTALablePIN false
securityCapabilities [WPA2-PMF, RSN, WPA3-Personal]
phyCapabilities [Wi-Fi 4]
supportAPVirtualDisplayPIN false
dfsChannels 52
supportAPPhysicalPushbutton false
supportAPVirtualPushbutton false
supportSTAPhysicalPushbutton false
wpa3SupportedDhGroups [19]
additionalCapabilities [802-11d, 802-11h]
oobWscStateConfigured false
apAllowsSelectionToProcessWscWithSepcifiedSTA false
productModel S40
wifiChipset
vendorId
wifiDriverVersion
wifiChipsetFirwareVersion
vendorName Lennox
productFirmwareVersion
productOs
productUnitId

Security and Hash validation Errors
Valid

Certification Result
Final Result: FAIL

Passed 1
Failed 0
Validator error 0
Not applicable 0
Incomplete 0

Certification Details
Certification Id
1,889
Version
R1: 2022-06-30
Description
-

Capabilities


Certification Details
Certification Id
1,461
Version
2021-05-18
Description
Test Details
Test Group Details
Test Group Name
Test Group : 2.4 GHz
Condition
(2.4 GHz Spectrum Capabilities)
Test Details
CT_PHY_Multi-PHY_STA_Association-BGmode_10035_1
NOT_TESTED
Test Id
202
Description
This test verifies that the STAUT can successfully associate with an AP configured to operate in 802.11bg mode.
CT_PHY_Multi-PHY_STA_Association-Bmode_10039_1
NOT_TESTED
Test Id
339
Description
This test verifies that the STAUT can successfully associate with an AP configured to operate in 802.11b mode.
CT_PHY_Multi-PHY_STA_Association-BGNmode_10037_1
NOT_TESTED
Test Id
201
Description
This test verifies that the STAUT can successfully associate with an AP configured to operate in 802.11bgn mode.

Test Group Details
Test Group Name
Test Group: 5 GHz
Condition
(5 GHz Spectrum Capabilities)
Test Details
CT_PHY_Multi-PHY_STA_Association-Amode_10031_1
NOT_TESTED
Test Id
337
Description
This test verifies that the STAUT can successfully associate with an AP configured to operate in 802.11a mode.
CT_PHY_Multi-PHY_STA_Association-ANmode_10033_1
NOT_TESTED
Test Id
338
Description
This test verifies that the STAUT can successfully associate with an AP configured to operate in 802.11an mode.


Certification Details
Certification Id
2,057
Version
2021-01: 2023-06-30
Description
-

Capabilities


Certification Details
Certification Id
2,056
Version
2023-06-30
Description
Test Details
Test Group Details
Test Group Name
Test Group : Default
Condition
Always
Test Details
CT_Security_WPA2Personal_STA_NoAssociation-WEP_10160_1
NOT_TESTED
Test Id
379
Description
This test verifies that the STAUT configured with WPA2-PSK does not associate with an AP configured with WEP.
CT_Security_WPA2Personal_STA_RSNEBoundsVerification-MultiAKM_10278_1
NOT_TESTED
Test Id
248
Description
This test verifies that the STAUT correctly performs bounds verification on the received RSNE from the test bed AP in Beacon and/or Probe Response frames.
CT_Security_WPA2Personal_STA_RSNEBoundsVerification-AbsentRSNCap_10273_1
NOT_TESTED
Test Id
245
Description
This test verifies that the STAUT correctly performs bounds verification on the received RSNE from the test bed AP in Beacon and/or Probe Response frames.
CT_Security_WPA2Personal_STA_RSNEBoundsVerification-AbsentPMKIDCount_10274_1
NOT_TESTED
Test Id
197
Description
This test verifies that the STAUT correctly performs bounds verification on the received RSNE from the test bed AP in Beacon and/or Probe Response frames
CT_Security_WPA2Personal_STA_UnexpectedRSNE-PMKIDPresent_10324_1
NOT_TESTED
Test Id
256
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_UnexpectedRSNE-NoAKM_10315_1
NOT_TESTED
Test Id
252
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_UnexpectedRSNE-TruncatedGrpCipher_10317_1
NOT_TESTED
Test Id
259
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_UnexpectedRSNE_IncompleteAKM_10323_1
NOT_TESTED
Test Id
250
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_UnexpectedRSNE-NoPairwise_10314_1
NOT_TESTED
Test Id
254
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_UnexpectedRSNE-TruncatedAKM_10319_1
NOT_TESTED
Test Id
258
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_Association-WPA2-Personal_10332_1
NOT_TESTED
Test Id
470
Description
This test verifies that the STAUT configured with WPA2-Personal associates with an AP configured with WPA2-Personal.
CT_Security_WPA2Personal_STA_RSNEBoundsVerification-UndefElem_10277_1
NOT_TESTED
Test Id
283
Description
This test verifies that the STAUT correctly performs bounds verification on the received RSNE from the test bed AP in Beacon and/or Probe Response frames.
CT_Security_WPA2Personal_STA_RSNEBoundsVerification-AllOptional_10276_1
NOT_TESTED
Test Id
246
Description
This test verifies that the STAUT correctly performs bounds verification on the received RSNE from the test bed AP in Beacon and/or Probe Response frames.
CT_Security_WPA2Personal_STA_RSNEBoundsVerification-AbsentGrpMgmtCipher_10275_1
NOT_TESTED
Test Id
243
Description
This test verifies that the STAUT correctly performs bounds verification on the received RSNE from the test bed AP in Beacon and/or Probe Response frames.
CT_Security_WPA2Personal_STA_UnexpectedRSNE-TruncatedPMKID_10321_1
NOT_TESTED
Test Id
261
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_UnexpectedRSNE-TruncatedPairwise_10318_1
NOT_TESTED
Test Id
260
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_NoAssociation-NoSecurityMode_10153_1
NOT_TESTED
Test Id
471
Description
This test verifies that the STAUT configured with WPA2-Personal does not associate with an AP configured with no security (open mode).
CT_Security_WPA2Personal_STA_UnexpectedRSNE-IncompletePairwise_10322_1
NOT_TESTED
Test Id
251
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_RSNEBoundsVerification-UnknownAKM_10279_1
NOT_TESTED
Test Id
249
Description
This test verifies that the STAUT correctly performs bounds verification on the received RSNE from the test bed AP in Beacon and/or Probe Response frames.
CT_Security_WPA2Personal_STA_RSNEBoundsVerification-FTPSKAKM_10280_1
NOT_TESTED
Test Id
247
Description
This test verifies that the STAUT correctly performs bounds verification on the received RSNE from the test bed AP in Beacon and/or Probe Response frames.
CT_Security_WPA2Personal_STA_UnexpectedRSNE-RSNProtoVer_10313_1
NOT_TESTED
Test Id
257
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_UnexpectedRSNE-NoPairwiseAKM_10316_1
NOT_TESTED
Test Id
255
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_UnexpectedRSNE-TruncatedRSNCap_10320_1
NOT_TESTED
Test Id
262
Description
This test verifies that the STAUT correctly handles unexpected values in the RSNE from the test bed AP and appropriately requests association.
CT_Security_WPA2Personal_STA_RSNCapabilitiesVerification-ReservedBit-15_10485_1
NOT_TESTED
Test Id
611
Description
This test verifies that the STAUT successfully associates, authenticates and passes data traffic when reserved bit 15 in the RSN Capabilities field is set to one instead of zero.
CT_Security_WPA2Personal_STA_RSNCapabilitiesVerification-OptionalBits_10486_2
NOT_TESTED
Test Id
740
Description
This test verifies that the STAUT does not set optional feature bits to one in the RSN Capabilities field on transmission when unsupported and ignores them on reception.


Certification Details
Certification Id
1,582
Version
R1: 2021-05-18
Description
-

Capabilities


Certification Details
Certification Id
1,465
Version
2021-05-18
Description
Test Details
Test Group Details
Test Group Name
Test Group: Default
Condition
Always
Test Details
CT_WMM_Core_STA_WMM-IE_10328_1
NOT_TESTED
Test Id
198
Description
This test verifies that the STAUT associate to AP that advertises WMM parameter IE.


Certification Details
Certification Id
2,386
Version
2024-10: 2025-01-31
Description

Capabilities


Certification Details
Certification Id
2,210
Version
2024-09-30
Description
Test Details
Test Group Details
Test Group Name
Default
Condition
Always
Test Details
CT_Security_WPA2Personal_STA_RSNCapabilitiesVerification-OptionalBits_10486_3
NOT_TESTED
Test Id
743
Description
This test verifies that the STAUT does not set optional feature bits to one in the RSN Capabilities field on transmission when unsupported and ignores them on reception.
CT_Security_RSN_STA_FC-RSNXE-SetAllBits-0_10810_1
NOT_TESTED
Test Id
744
Description
This test case verifies that the STAUT successfully discovers and connects to a testbed AP that advertises RSNXE; all bits set to zero (including bit 5 SAE H2E field).
CT_Security_RSN_STA_FC-RSNXE-RandomBytes_10811_1
NOT_TESTED
Test Id
745
Description
This test case verifies that the STAUT successfully discovers and connects to a testbed AP that advertises RSNXE with random number of bytes (2 to n bytes) with random bits in RSNXE set to one or zero.
CT_Security_RSN_STA_FC-AKMSuiteSelectors-Wi-Fi6_10827_1
NOT_TESTED
Test Id
746
Description
This test case verifies that the STAUT successfully discovers and connects to a testbed AP that advertises multiple AKM Suite Selectors.
CT_Security_RSN_STA_FC-AKM-FirstLastUnknown_10844_1
NOT_TESTED
Test Id
747
Description
This test case verifies that the STAUT successfully discovers and connects to a testbed AP that advertises multiple AKM Suite Selectors with first and last AKM in the list being random unknown AKMs.
CT_Security_RSN_STA_FC-PairwiseCipherSuiteSelectors-Wi-Fi6_10847_1
NOT_TESTED
Test Id
748
Description
This test case verifies that the STAUT successfully discovers and connects to a testbed AP that advertises multiple pairwise cipher suite selectors.
CT_Security_RSN_STA_FC-RSNCap-SetReservedBits-1_10848_1
NOT_TESTED
Test Id
749
Description
This test case verifies that the STAUT successfully discovers and connects when testbed AP is configured the reserved bits in the RSN Capabilities field set to one instead of zero.
CT_Security_RSN_STA_FC-EAPOLM3-RandomKDE_10850_1
NOT_TESTED
Test Id
750
Description
This test case verifies that the STAUT successfully discovers and connects to a testbed AP that includes a random number of random unknown/undefined KDEs in EAPOL (M3) message.
CT_Security_RSN_STA_FC-EAPOLM3-GTK-KDE-SetReservedBits-1_10853_1
NOT_TESTED
Test Id
753
Description
This test case verifies that the STAUT successfully connects to a testbed AP that includes GTK KDE in EAPOL M3 message with reserved bits of GTK KDE randomly set to one.


Certification Details
Certification Id
2,292
Version
2024-10: 2024-11-30
Description
-

Capabilities


Certification Details
Certification Id
2,099
Version
2023-12-14
Description
Test Details
Test Group Details
Test Group Name
Test Group : Default
Condition
(2.4 GHz Spectrum Capabilities || 5 GHz Spectrum Capabilities)
Test Details
CT_Security_WPA3Personal_STA_DoS-AttackResponse_10117_2
NOT_TESTED
Test Id
388
Description
This test verifies that the STAUT is able to connect to an AP that has exceeded its Anticlogging Threshold value.
CT_Security_WPA3Personal_STA_HnPandH2E-auth-HnPonly_10361_1
NOT_TESTED
Test Id
392
Description
This test verifies that the STAUT supporting both Hunting-and-Pecking and Hash-to-element successfully performs SAE authentication with an AP that is configured to use Hunting-and-Pecking only.
CT_Security_WPA3Personal_STA_HnPandH2E-auth-H2Eonly_10362_1
NOT_TESTED
Test Id
390
Description
This test verifies that the STAUT supporting both Hunting-and-Pecking and Hash-to-element successfully performs SAE authentication with an AP that is configured to use hash-to-element only.
CT_Security_WPA3Personal_STA_HnPandH2E-auth-HnPandH2E_10363_1
NOT_TESTED
Test Id
391
Description
This test verifies that the STAUT supporting both Hunting-and-Pecking and Hash-to-element successfully performs SAE authentication with an AP that is configured to also support both Hunting-and-Pecking and hash-to-element.
CT_Security_WPA3Personal_STA_DoS-AttackResponse-HnPandH2E_10364_1
NOT_TESTED
Test Id
389
Description
This test verifies that the STAUT is able to connect to a test bed AP that has exceeded its AntiCloggingThreshold value when H2E is used for PWE derivation.
CT_Security_WPA3Personal_STA_SAEConfirmationExchangeVariation_10371_2
NOT_TESTED
Test Id
395
Description
This test verifies that the STAUT can successfully complete the SAE protocol with the test bed AP when the testbed AP initiates the SAE confirmation exchange by transmitting an SAE Confirm message immediately after sending its SAE Commit message to the STAUT during the SAE authentication exchange.
CT_Security_WPA3Personal_STA_NoAssociation-NoSecurityMode_10155_1
NOT_TESTED
Test Id
309
Description
This test verifies that a WPA3 only STAUT cannot be connected to a testbed AP with open security
CT_Security_WPA3Personal_STA_NoAssociation-WEP_10162_1
NOT_TESTED
Test Id
310
Description
This test verifies that a WPA3 only STAUT cannot be connected to a testbed AP with only WEP enabled
CT_Security_WPA3Personal_STA_NoAssociation-WPA2Personal_10165_1
NOT_TESTED
Test Id
311
Description
This test verifies that a WPA3 only STAUT cannot be connected to a WPA2 testbed AP.
CT_Security_WPA3Personal_STA_RejectionImproperElements-InvalidElem_10221_1
NOT_TESTED
Test Id
313
Description
This test verifies that the STAUT correctly rejects improper elements received from the test bed STA.
CT_Security_WPA3Personal_STA_RejectionImproperElements-ZeroScalar_10222_1
NOT_TESTED
Test Id
316
Description
This test verifies that the STAUT correctly rejects an invalid scalar value set to zero in the SAE commit message received from the test bed STA.
CT_Security_WPA3Personal_STA_RejectionImproperElements-OneScalar_10223_1
NOT_TESTED
Test Id
315
Description
This test verifies that the STAUT correctly rejects an invalid scalar value set to one in the SAE Commit message received from the test bed STA.
CT_Security_WPA3Personal_STA_RejectionImproperElements-InvalidOrder_10224_1
NOT_TESTED
Test Id
314
Description
This test verifies that the STAUT correctly rejects invalid order received from the test bed STA.
CT_Security_WPA3Personal_STA_RejectionUnsuitableDHgroups_10248_1
NOT_TESTED
Test Id
317
Description
This test validates that the STAUT initiating SAE authentication never requests, in the SAE Commit message, a DH group marked as unsuitable (per Table 1).
CT_Security_WPA3Personal_STA_PMK-caching_10202_2
NOT_TESTED
Test Id
585
Description
This test verifies that the STAUT saves the PMK from the initial SAE authentication to perform a successful reconnection using PMKSA caching.
CT_Security_WPA3Personal_STA_Reflection-AttackResponse_10214_2
NOT_TESTED
Test Id
718
Description
This test verifies that the STAUT correctly handles a reflection attack during SAE commitment exchange.


Certification Details
Certification Id
1,934
Version
2022-12-09
Description
Test Details
Test Group Details
Test Group Name
Test Group: Default
Condition
Always
Test Details
CT_Security_RSN_STA_CapabilitiesVerification-ReservedBits-31_10603_1
NOT_TESTED
Test Id
692
Description
This test verifies that the STAUT successfully associates, authenticates and passes data traffic when reserved bits in the RSN Capabilities and Extended RSN Capabilities fields are set to one instead of zero, and when the RSNXE is extended. This test also verifies that the STAUT does not set optional feature bits to one in the RSN Capabilities and Extended RSN Capabilities fields on transmission when unsupported and ignores them on reception. Note: The Information field of the RSNXE currently consists of just the Extended RSN Capabilities field. In the future, when the RSNXE is extended, this might be through extending the Extended RSN Capabilities field (up to its maximum length of 16 octets), but it might also be by adding a new field in the RSNXE after the Extended RSN Capabilities field.
CT_Security_RSN_STA_CapabilitiesVerification-ReservedBits-SAE-PK_10604_1
NOT_TESTED
Test Id
693
Description
This test verifies that the STAUT successfully associates, authenticates and passes data traffic when reserved bits in the RSN Capabilities and Extended RSN Capabilities fields are set to one instead of zero, and when the RSNXE is extended. This test also verifies that the STAUT does not set optional feature bits to one in the RSN Capabilities and Extended RSN Capabilities fields on transmission when unsupported and ignores them on reception. Note: The Information field of the RSNXE currently consists of just the Extended RSN Capabilities field. In the future, when the RSNXE is extended, this might be through extending the Extended RSN Capabilities field (up to its maximum length of 16 octets), but it might also be by adding a new field in the RSNXE after the Extended RSN Capabilities field.
CT_Security_RSN_STA_CapabilitiesVerification-ReservedBits-Extra_10605_1
NOT_TESTED
Test Id
694
Description
This test verifies that the STAUT successfully associates, authenticates and passes data traffic when reserved bits in the RSN Capabilities and Extended RSN Capabilities fields are set to one instead of zero, and when the RSNXE is extended. This test also verifies that the STAUT does not set optional feature bits to one in the RSN Capabilities and Extended RSN Capabilities fields on transmission when unsupported and ignores them on reception. Note: The Information field of the RSNXE currently consists of just the Extended RSN Capabilities field. In the future, when the RSNXE is extended, this might be through extending the Extended RSN Capabilities field (up to its maximum length of 16 octets), but it might also be by adding a new field in the RSNXE after the Extended RSN Capabilities field.
CT_Security_WPA3Personal_STA_NoAssociation-RSNXEMismatch_10346_2
NOT_TESTED
Test Id
702
Description
This test verifies that the STAUT aborts 4-way handshake when it detects a mismatch in the RSNXE in EAPOL Message 3 and Beacon (or Probe Response) frames from an AP.


Certification Details
Certification Id
1,548
Version
2021-05-18
Description
Test Details
Test Group Details
Test Group Name
Test Group: Default
Condition
Always
Test Details
CT_Security_WPA3Personal-transition_STA_WPA3-PersonalTransitionMode_10335_2
NOT_TESTED
Test Id
400
Description
This test verifies that the STAUT configured for WPA3-Personal transition mode prefers SAE to connect to an AP advertising WPA3-Personal transition mode support.


Certification Details
Certification Id
2,100
Version
2023-12-14
Description
Test Details
Test Group Details
Test Group Name
Test Group: Default
Condition
Always
Test Details
CT_Security_WPA3Personal-transition_STA_TransitionDisable_10347_3
NOT_TESTED
Test Id
738
Description
This test verifies that, if the network indicates Transition Disable for WPA3-Personal Transition mode, the STAUT applies the policy and does not attempt to associate with an AP that only supports WPA2-Personal


Certification Details
Certification Id
1,655
Version
R1: 2021-11-02
Description
-

Capabilities


Certification Details
Certification Id
1,681
Version
2021-11-02
Description
Test Details
Test Group Details
Test Group Name
Test Group: Default
Condition
(2.4 GHz Spectrum Capabilities || 5 GHz Spectrum Capabilities)
Test Details
CT_Security_PMF_STA_Association-PMFDisabled_10044_1
NOT_TESTED
Test Id
419
Description
This test verifies that the STAUT configured with PMF enabled can successfully associate to a PMF disabled AP.
CT_Security_PMF_STA_Association-PMFEnabled_10049_1
NOT_TESTED
Test Id
421
Description
This test verifies that the STAUT configured with PMF enabled can successfully associate to a PMF enabled AP using the most secure AKM Suite being advertised.
CT_Security_PMF_STA_Association-PMFRequired_10056_1
NOT_TESTED
Test Id
422
Description
This test verifies that the STAUT configured with PMF enabled can successfully associate to a PMF required AP.
CT_Security_PMFRequired_STA_Association-PMFRequired_10054_1
NOT_TESTED
Test Id
433
Description
This test verifies that the STAUT configured for PMF Required successfully with PMF Required AP.
CT_Security_PMFRequired_STA_NoAssociation-PMFDisabled_10158_1
NOT_TESTED
Test Id
434
Description
This test verifies that the STAUT configured with PMF Required does not attempt association with a PMF disabled AP.
CT_Security_PMF_STA_CCMP-ProtectedUnicastMgmtFrames-CorrectProtDeauth_10083_1
NOT_TESTED
Test Id
426
Description
This test verifies that the STAUT correctly responds to correctly protected unicast de-authentication management frame from the test bed AP.
CT_Security_PMF_STA_CCMP-ProtectedUnicastMgmtFrames-CorrectProtDisassoc_10084_1
NOT_TESTED
Test Id
376
Description
This test verifies that the STAUT correctly responds to a correctly protected unicast disassociation frame from the test bed AP.
CT_Security_PMF_STA_BIP-ProtectedBroadcastMgmtFrames-CorrectProtDeauth_10071_1
NOT_TESTED
Test Id
423
Description
This test verifies that the STAUT correctly responds to a correctly protected broadcast de-authentication management frame from the test bed AP.
CT_Security_PMF_STA_BIP-CorrectProtBroadcastMgmtFrames-CorrectProtDisassoc_10072_1
NOT_TESTED
Test Id
424
Description
This test verifies that the STAUT correctly responds to a correctly protected broadcast disassociation frame from the test bed AP.
CT_Security_PMF_STA_CCMP-ProtectedUnicastMgmtFrames-CorrectProtSAQuery_10085_1
NOT_TESTED
Test Id
428
Description
This test verifies that the STAUT correctly responds to correctly protected unicast SA Query management frame from the test bed AP.


Certification Details
Certification Id
1,855
Version
2022-12: 2022-12-01
Description

Capabilities


Certification Details
Certification Id
1,854
Version
2022-12-01
Description
Test Details
Test Group Details
Test Group Name
Test Group: Default
Condition
(2.4 GHz Spectrum Capabilities)
Test Details
CT_Security_WPA2Personal_STA_4wayHandshakeVulnerability-EncryptedM3Retransmission_10002_2
NOT_TESTED
Test Id
565
Description
This test verifies that the STAUT is not vulnerable to PTK and GTK key reinstallation using immediate retransmission of an encrypted EAPOL M3 message during the pairwise rekey handshake
CT_Security_WPA2Personal_STA_4wayHandshakeVulnerability-ImmediateM3Retransmission_10003_2
PASS
Test Id
569
Description
This test verifies that the STAUT is not vulnerable to PTK key re-installation using immediate re-transmission of an EAPOL Message 3 in plain-text.
CT_Security_WPA2Personal_STA_GroupKeyHandshakeVulnerability_10138_2
NOT_TESTED
Test Id
580
Description
This test verifies that the STAUT is not vulnerable to GTK key reinstallation.
CT_Security_WPA2Personal_STA_ReplayProtection_10249_2
NOT_TESTED
Test Id
581
Description
This test verifies that the STAUT correctly performs replay protection on group addressed frames
CT_Security_WPA2Personal_STA_4wayHandshakeVulnerability-RandomANonce_10005_3
NOT_TESTED
Test Id
687
Description
This test verifies that the STAUT is not vulnerable to PTK key reinstallation during the 4-way handshake using a random ANonce when the AP uses Temporal PTK construction.
CT_Security_WPA2Personal_STA_4wayHandshakeVulnerability-SameANonce_10006_3
NOT_TESTED
Test Id
688
Description
This test verifies that the STAUT is not vulnerable to PTK key reinstallation during the 4-way handshake using the same ANonce when the AP uses Temporal PTK construction.