Which of the following vulnerabilities may occurwhile the client and the AP exchange the challenge text over the wireless link?