The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.
References
Configurations
History
21 Nov 2024, 00:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://arstechnica.com/articles/paedia/wpa-cracked.ars - | |
References | () http://dl.aircrack-ng.org/breakingwepandwpa.pdf - Exploit | |
References | () http://lists.immunitysec.com/pipermail/dailydave/2008-November/005413.html - | |
References | () http://radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html - | |
References | () http://trac.aircrack-ng.org/svn/trunk/src/tkiptun-ng.c - Exploit | |
References | () http://www.aircrack-ng.org/doku.php?id=tkiptun-ng - | |
References | () http://www.cisco.com/en/US/products/products_security_response09186a0080a30036.html - | |
References | () http://www.securityfocus.com/bid/32164 - |
Information
Published : 2008-11-25 23:30
Updated : 2024-11-21 00:53
NVD link : CVE-2008-5230
Mitre link : CVE-2008-5230
CVE.ORG link : CVE-2008-5230
JSON object : View
Products Affected
cisco
- ios
CWE
CWE-310
Cryptographic Issues