Описание
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | not-affected | |
esm-infra/xenial | not-affected | |
precise/esm | DNE | |
trusty | not-affected | |
trusty/esm | not-affected | |
upstream | needs-triage | |
vivid/ubuntu-core | not-affected | |
xenial | not-affected | |
zesty | not-affected |
Показывать по
EPSS
5.4 Medium
CVSS2
6.8 Medium
CVSS3
Связанные уязвимости
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Sta ...
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (STK-key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети
EPSS
5.4 Medium
CVSS2
6.8 Medium
CVSS3