Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2017-10-17 13:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-13082
Mitre link : CVE-2017-13082
CVE.ORG link : CVE-2017-13082
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
suse
- openstack_cloud
- linux_enterprise_point_of_sale
- linux_enterprise_desktop
- linux_enterprise_server
w1.fi
- wpa_supplicant
- hostapd
opensuse
- leap
freebsd
- freebsd
canonical
- ubuntu_linux
debian
- debian_linux