A rogue peer is an end-user computer-usually a
laptop-that has both bridging and
wireless enabled. Since the basic functions of an
access point are
bridging and wireless access, any laptop that has these capabilities presents a similar vulnerability or worse. The vulnerability with a rogue peer can be much more severe than with a
rogue AP, because laptops provide almost no security features to prevent connections from other unauthorized users.
A rogue peer is one of two categories of rogue wireless devices, with the other being rogue access points.