Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-13084

Опубликовано: 17 окт. 2017
Источник: debian
EPSS Низкий

Описание

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wpaunfixedpackage

Примечания

  • From https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt

  • As far as the related CVE-2017-13084 (reinstallation of the STK key in

  • the PeerKey handshake) is concerned, it should be noted that PeerKey

  • implementation in wpa_supplicant is not fully functional and the actual

  • installation of the key into the driver does not work. As such, this

  • item is not applicable in practice. Furthermore, the PeerKey handshake

  • for IEEE 802.11e DLS is obsolete and not known to have been deployed.

EPSS

Процентиль: 75%
0.00901
Низкий

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS3: 8.1
redhat
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS3: 6.8
nvd
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS3: 6.8
github
около 3 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS3: 7.9
fstec
почти 8 лет назад

Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (STK-key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети

EPSS

Процентиль: 75%
0.00901
Низкий