CVE-2008-5230

The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.
Configurations

Configuration 1 (hide)

cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://arstechnica.com/articles/paedia/wpa-cracked.ars - () http://arstechnica.com/articles/paedia/wpa-cracked.ars -
References () http://dl.aircrack-ng.org/breakingwepandwpa.pdf - Exploit () http://dl.aircrack-ng.org/breakingwepandwpa.pdf - Exploit
References () http://lists.immunitysec.com/pipermail/dailydave/2008-November/005413.html - () http://lists.immunitysec.com/pipermail/dailydave/2008-November/005413.html -
References () http://radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html - () http://radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html -
References () http://trac.aircrack-ng.org/svn/trunk/src/tkiptun-ng.c - Exploit () http://trac.aircrack-ng.org/svn/trunk/src/tkiptun-ng.c - Exploit
References () http://www.aircrack-ng.org/doku.php?id=tkiptun-ng - () http://www.aircrack-ng.org/doku.php?id=tkiptun-ng -
References () http://www.cisco.com/en/US/products/products_security_response09186a0080a30036.html - () http://www.cisco.com/en/US/products/products_security_response09186a0080a30036.html -
References () http://www.securityfocus.com/bid/32164 - () http://www.securityfocus.com/bid/32164 -

Information

Published : 2008-11-25 23:30

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5230

Mitre link : CVE-2008-5230

CVE.ORG link : CVE-2008-5230


JSON object : View

Products Affected

cisco

  • ios
CWE
CWE-310

Cryptographic Issues