Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt cve-icon cve-icon
http://www.debian.org/security/2017/dsa-3999 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/228519 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html cve-icon cve-icon
http://www.securityfocus.com/bid/101274 cve-icon cve-icon
http://www.securitytracker.com/id/1039573 cve-icon cve-icon
http://www.securitytracker.com/id/1039576 cve-icon cve-icon
http://www.securitytracker.com/id/1039577 cve-icon cve-icon
http://www.securitytracker.com/id/1039578 cve-icon cve-icon
http://www.securitytracker.com/id/1039581 cve-icon cve-icon
http://www.securitytracker.com/id/1039585 cve-icon cve-icon
http://www.securitytracker.com/id/1041432 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3455-1 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2907 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2911 cve-icon cve-icon
https://access.redhat.com/security/vulnerabilities/kracks cve-icon cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf cve-icon cve-icon
https://cert.vde.com/en-us/advisories/vde-2017-003 cve-icon cve-icon
https://cert.vde.com/en-us/advisories/vde-2017-005 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2017-13077 cve-icon
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc cve-icon cve-icon
https://security.gentoo.org/glsa/201711-03 cve-icon cve-icon
https://source.android.com/security/bulletin/2017-11-01 cve-icon cve-icon
https://source.android.com/security/bulletin/2018-04-01 cve-icon cve-icon
https://source.android.com/security/bulletin/2018-06-01 cve-icon cve-icon
https://support.apple.com/HT208219 cve-icon cve-icon
https://support.apple.com/HT208220 cve-icon cve-icon
https://support.apple.com/HT208221 cve-icon cve-icon
https://support.apple.com/HT208222 cve-icon cve-icon
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us cve-icon cve-icon
https://support.lenovo.com/us/en/product_security/LEN-17420 cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa cve-icon cve-icon
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt cve-icon cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2017-13077 cve-icon
https://www.krackattacks.com/ cve-icon cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-05T18:58:12.291Z

Reserved: 2017-08-22T00:00:00

Link: CVE-2017-13077

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-10-17T02:29:00.207

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-13077

cve-icon Redhat

Severity : Important

Publid Date: 2017-10-16T00:00:00Z

Links: CVE-2017-13077 - Bugzilla

cve-icon OpenCVE Enrichment

No data.