Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1150-1 | wpa security update |
Debian DLA |
DLA-1200-1 | linux security update |
Debian DLA |
DLA-1573-1 | firmware-nonfree security update |
Debian DSA |
DSA-3999-1 | wpa security update |
EUVD |
EUVD-2017-4598 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients. |
Ubuntu USN |
USN-3455-1 | wpa_supplicant and hostapd vulnerabilities |
Ubuntu USN |
USN-3505-1 | Linux firmware vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T18:58:12.283Z
Reserved: 2017-08-22T00:00:00
Link: CVE-2017-13080
No data.
Status : Deferred
Published: 2017-10-17T13:29:00.397
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-13080
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN