Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-13077

Опубликовано: 16 окт. 2017
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

A new exploitation technique called key reinstallation attacks (KRACKs) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit this attack to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by reinstalling a previously used pairwise key (PTK-TK) during a 4-way handshake.

Отчет

This issue affects the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 5, 6, and 7.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wpa_supplicantWill not fix
Red Hat Enterprise Linux 6wpa_supplicantFixedRHSA-2017:291118.10.2017
Red Hat Enterprise Linux 7wpa_supplicantFixedRHSA-2017:290717.10.2017

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-323
https://bugzilla.redhat.com/show_bug.cgi?id=1491692wpa_supplicant: Reinstallation of the pairwise key in the 4-way handshake

EPSS

Процентиль: 77%
0.01057
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS3: 6.8
nvd
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS3: 6.8
debian
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pai ...

CVSS3: 6.8
github
около 3 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS3: 7.9
fstec
почти 8 лет назад

Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (pairwise key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети

EPSS

Процентиль: 77%
0.01057
Низкий

8.1 High

CVSS3