Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-13079

Опубликовано: 16 окт. 2017
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

Отчет

This issue did not affect the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 5, 6, and 7, as CONFIG_IEEE80211W was not enabled.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wpa_supplicantNot affected
Red Hat Enterprise Linux 6wpa_supplicantNot affected
Red Hat Enterprise Linux 7wpa_supplicantNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-323
https://bugzilla.redhat.com/show_bug.cgi?id=1491694wpa_supplicant: Reinstallation of the integrity group key in the 4-way handshake

EPSS

Процентиль: 59%
0.00394
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

CVSS3: 5.3
nvd
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

CVSS3: 5.3
debian
больше 7 лет назад

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allow ...

CVSS3: 5.3
github
около 3 лет назад

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

CVSS3: 7.9
fstec
почти 8 лет назад

Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (integrity group key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети

EPSS

Процентиль: 59%
0.00394
Низкий

8.1 High

CVSS3

Уязвимость CVE-2017-13079