Authentication issue that does not verify the source of a packet which could allow an attacker to create a denial-of-service condition or modify the configuration of the device.
Use of a weak pseudo-random number generator, which may allow an attacker to read or inject encrypted PowerG packets.
Due to Nonce reuse, attackers can perform reply attack or decrypt captured packets.