Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-13078

Опубликовано: 16 окт. 2017
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit this attack to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by reinstalling a previously used group key (GTK) during a 4-way handshake.

Отчет

This issue affects the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 5, 6, and 7.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wpa_supplicantWill not fix
Red Hat Enterprise Linux 6wpa_supplicantFixedRHSA-2017:291118.10.2017
Red Hat Enterprise Linux 7wpa_supplicantFixedRHSA-2017:290717.10.2017

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-323
https://bugzilla.redhat.com/show_bug.cgi?id=1491693wpa_supplicant: Reinstallation of the group key in the 4-way handshake

EPSS

Процентиль: 74%
0.00838
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

CVSS3: 5.3
nvd
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

CVSS3: 5.3
debian
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Gro ...

CVSS3: 5.3
github
около 3 лет назад

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

CVSS3: 7.9
fstec
почти 8 лет назад

Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (group key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети

EPSS

Процентиль: 74%
0.00838
Низкий

8.1 High

CVSS3