Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html cve-icon cve-icon
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt cve-icon cve-icon
http://www.debian.org/security/2017/dsa-3999 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/228519 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html cve-icon cve-icon
http://www.securityfocus.com/bid/101274 cve-icon cve-icon
http://www.securitytracker.com/id/1039572 cve-icon cve-icon
http://www.securitytracker.com/id/1039573 cve-icon cve-icon
http://www.securitytracker.com/id/1039576 cve-icon cve-icon
http://www.securitytracker.com/id/1039577 cve-icon cve-icon
http://www.securitytracker.com/id/1039578 cve-icon cve-icon
http://www.securitytracker.com/id/1039581 cve-icon cve-icon
http://www.securitytracker.com/id/1039585 cve-icon cve-icon
http://www.securitytracker.com/id/1039703 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3455-1 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2907 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2911 cve-icon cve-icon
https://access.redhat.com/security/vulnerabilities/kracks cve-icon cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf cve-icon cve-icon
https://cert.vde.com/en-us/advisories/vde-2017-003 cve-icon cve-icon
https://cert.vde.com/en-us/advisories/vde-2017-005 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2017-13080 cve-icon
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080 cve-icon cve-icon
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc cve-icon cve-icon
https://security.gentoo.org/glsa/201711-03 cve-icon cve-icon
https://source.android.com/security/bulletin/2017-11-01 cve-icon cve-icon
https://support.apple.com/HT208219 cve-icon cve-icon
https://support.apple.com/HT208220 cve-icon cve-icon
https://support.apple.com/HT208221 cve-icon cve-icon
https://support.apple.com/HT208222 cve-icon cve-icon
https://support.apple.com/HT208325 cve-icon cve-icon
https://support.apple.com/HT208327 cve-icon cve-icon
https://support.apple.com/HT208334 cve-icon cve-icon
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us cve-icon cve-icon
https://support.lenovo.com/us/en/product_security/LEN-17420 cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa cve-icon cve-icon
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt cve-icon cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2017-13080 cve-icon
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html cve-icon cve-icon
https://www.krackattacks.com/ cve-icon cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2017-10-17T13:00:00

Updated: 2024-08-05T18:58:12.283Z

Reserved: 2017-08-22T00:00:00

Link: CVE-2017-13080

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-10-17T13:29:00.397

Modified: 2024-11-21T03:10:55.310

Link: CVE-2017-13080

cve-icon Redhat

Severity : Important

Publid Date: 2017-10-16T00:00:00Z

Links: CVE-2017-13080 - Bugzilla