Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1150-1 | wpa security update |
Debian DLA |
DLA-1573-1 | firmware-nonfree security update |
Debian DSA |
DSA-3999-1 | wpa security update |
EUVD |
EUVD-2017-4599 | Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients. |
Ubuntu USN |
USN-3455-1 | wpa_supplicant and hostapd vulnerabilities |
Ubuntu USN |
USN-3505-1 | Linux firmware vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T18:58:12.441Z
Reserved: 2017-08-22T00:00:00
Link: CVE-2017-13081
No data.
Status : Deferred
Published: 2017-10-17T13:29:00.443
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-13081
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN