802.11 Deauthentication Frames

Modified on Wed, Aug 2, 2023 at 8:33 AM

One event that may likely be present fairly often in an environment will be the DEAUTHENTICATION FRAME identifier. This event is generated by an AirShield when any 802.11 deauthentication message is sent from the Access Point. There are many reasons why this would be sent with most of them being benign for security.


Deauthentication frames may be sent from the Access Point to a Station (client) or be broadcasted to all nearby devices. BROADCAST DEAUTHENTICATION frames are reported separately as these present a different risk profile.


There are specific codes used by 802.11 to describe why a deauthentication is being requested. This information is reported in the body of the message.


Critical Deauthentication Frames

When observed the following critical reason codes will raise the severity level of the event to 8 out of 10.


Reason CodeDescription
18Invalid Group Cipher sent from the Station
19Invalid Pairwise Cipher sent from the Station
20Invalid Authentication and Key Management Protocol
21Unsupported Robust Security Network Element version
22Invalid Robust Security Network Element capability
23802.1x Authentication Failed
24Cipher Suite Rejected Based on Security Policy


Each of these events may occur if a device is failing to meeting security practices or a malicious actor is probing for weaknesses.

Any DEAUTHENTICATION FRAME with a severity of 8 should be investigated.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article