Количество 13
Количество 13
BDU:2017-02263
Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (pairwise key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети
CVE-2017-13077
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
CVE-2017-13077
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
CVE-2017-13077
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
CVE-2017-13077
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pai ...
GHSA-wxv4-3q58-w3mx
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
ELSA-2017-2911
ELSA-2017-2911: wpa_supplicant security update (IMPORTANT)
ELSA-2017-2907
ELSA-2017-2907: wpa_supplicant security update (IMPORTANT)
SUSE-SU-2020:3424-1
Security update for wpa_supplicant
SUSE-SU-2022:1853-1
Security update for wpa_supplicant
openSUSE-SU-2020:2059-1
Security update for wpa_supplicant
openSUSE-SU-2020:2053-1
Security update for wpa_supplicant
SUSE-SU-2020:3380-1
Security update for wpa_supplicant
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2017-02263 Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (pairwise key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети | CVSS3: 7.9 | 1% Низкий | около 8 лет назад | |
CVE-2017-13077 Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. | CVSS3: 6.8 | 1% Низкий | около 8 лет назад | |
CVE-2017-13077 Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. | CVSS3: 8.1 | 1% Низкий | около 8 лет назад | |
CVE-2017-13077 Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. | CVSS3: 6.8 | 1% Низкий | около 8 лет назад | |
CVE-2017-13077 Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pai ... | CVSS3: 6.8 | 1% Низкий | около 8 лет назад | |
GHSA-wxv4-3q58-w3mx Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. | CVSS3: 6.8 | 1% Низкий | больше 3 лет назад | |
ELSA-2017-2911 ELSA-2017-2911: wpa_supplicant security update (IMPORTANT) | около 8 лет назад | |||
ELSA-2017-2907 ELSA-2017-2907: wpa_supplicant security update (IMPORTANT) | около 8 лет назад | |||
SUSE-SU-2020:3424-1 Security update for wpa_supplicant | почти 5 лет назад | |||
SUSE-SU-2022:1853-1 Security update for wpa_supplicant | больше 3 лет назад | |||
openSUSE-SU-2020:2059-1 Security update for wpa_supplicant | почти 5 лет назад | |||
openSUSE-SU-2020:2053-1 Security update for wpa_supplicant | почти 5 лет назад | |||
SUSE-SU-2020:3380-1 Security update for wpa_supplicant | почти 5 лет назад |
Уязвимостей на страницу