Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1150-1 | wpa security update |
![]() |
DLA-1573-1 | firmware-nonfree security update |
![]() |
DSA-3999-1 | wpa security update |
![]() |
EUVD-2017-4599 | Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients. |
![]() |
USN-3455-1 | wpa_supplicant and hostapd vulnerabilities |
![]() |
USN-3505-1 | Linux firmware vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T18:58:12.441Z
Reserved: 2017-08-22T00:00:00
Link: CVE-2017-13081

No data.

Status : Deferred
Published: 2017-10-17T13:29:00.443
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-13081


No data.