Vulnerable access points transmit security keys over the air in unencrypted text, meaning that an eavesdropper could intercept them. The affected equipment transmits clear-text versions of Wired Equivalent Privacy (WEP) static keys to a Simple Network Management Protocol (SNMP) server. Attackers would only be able to snatch WEP keys if they were able to monitor data sent between the access point and the SNMP server.
The devices are affected only when the command “snmp-server enable traps wlan-wep” is enabled, and it does not affect dynamically set WEP keys.
Cisco said users should upgrade to IOS version 12.2(13)JA1 or later, or switch off the SNMP command in question.
Users can also get around the problem by switching to an authentication protocol that uses dynamically set keys, several of which are supported by the access points.
More info: [url=http://zdnet.com.com/2100-1105_2-5113232.html]http://zdnet.com.com/2100-1105_2-5113232.html[/url]