Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html - Third Party Advisory | |
References | () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt - Third Party Advisory | |
References | () http://www.debian.org/security/2017/dsa-3999 - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/228519 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/101274 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039573 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039576 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039577 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039578 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039581 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-3455-1 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2907 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2911 - Third Party Advisory | |
References | () https://access.redhat.com/security/vulnerabilities/kracks - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf - | |
References | () https://cert.vde.com/en-us/advisories/vde-2017-005 - | |
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201711-03 - | |
References | () https://source.android.com/security/bulletin/2017-11-01 - | |
References | () https://support.lenovo.com/us/en/product_security/LEN-17420 - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa - Third Party Advisory | |
References | () https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt - Third Party Advisory | |
References | () https://www.krackattacks.com/ - Technical Description, Third Party Advisory |
Information
Published : 2017-10-17 13:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-13087
Mitre link : CVE-2017-13087
CVE.ORG link : CVE-2017-13087
JSON object : View
Products Affected
freebsd
- freebsd
w1.fi
- hostapd
- wpa_supplicant
opensuse
- leap
debian
- debian_linux
suse
- linux_enterprise_desktop
- linux_enterprise_server
- linux_enterprise_point_of_sale
- openstack_cloud
canonical
- ubuntu_linux
redhat
- enterprise_linux_desktop
- enterprise_linux_server
CWE
CWE-330
Use of Insufficiently Random Values