Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-13080

Опубликовано: 17 окт. 2017
Источник: debian
EPSS Низкий

Описание

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firmware-nonfreefixed20180825-1package
firmware-nonfreefixed20161130-4stretchpackage
firmware-nonfreeno-dsajessiepackage
wpafixed2:2.4-1.1package
linuxfixed4.13.13-1package
linuxfixed4.9.65-1stretchpackage
linuxfixed3.16.51-1jessiepackage

Примечания

  • https://w1.fi/security/2017-1/

  • https://git.kernel.org/linus/fdf7cb4185b60c68e1a75e61691c4afdc15dea0e (v4.14-rc6)

EPSS

Процентиль: 77%
0.01118
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

CVSS3: 8.1
redhat
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

CVSS3: 5.3
nvd
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

CVSS3: 4.2
msrc
больше 7 лет назад

Windows Wireless WPA Group Key Reinstallation Vulnerability

CVSS3: 5.3
github
около 3 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

EPSS

Процентиль: 77%
0.01118
Низкий