Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html cve-icon cve-icon
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt cve-icon cve-icon
http://www.debian.org/security/2017/dsa-3999 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/228519 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html cve-icon cve-icon
http://www.securityfocus.com/bid/101274 cve-icon cve-icon
http://www.securitytracker.com/id/1039573 cve-icon cve-icon
http://www.securitytracker.com/id/1039576 cve-icon cve-icon
http://www.securitytracker.com/id/1039577 cve-icon cve-icon
http://www.securitytracker.com/id/1039578 cve-icon cve-icon
http://www.securitytracker.com/id/1039581 cve-icon cve-icon
http://www.securitytracker.com/id/1039585 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3455-1 cve-icon cve-icon
https://access.redhat.com/security/vulnerabilities/kracks cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf cve-icon cve-icon
https://cert.vde.com/en-us/advisories/vde-2017-005 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2017-13081 cve-icon
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc cve-icon cve-icon
https://security.gentoo.org/glsa/201711-03 cve-icon cve-icon
https://source.android.com/security/bulletin/2017-11-01 cve-icon cve-icon
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa cve-icon cve-icon
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt cve-icon cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2017-13081 cve-icon
https://www.krackattacks.com/ cve-icon cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2017-10-17T13:00:00

Updated: 2024-08-05T18:58:12.441Z

Reserved: 2017-08-22T00:00:00

Link: CVE-2017-13081

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-10-17T13:29:00.443

Modified: 2024-11-21T03:10:55.540

Link: CVE-2017-13081

cve-icon Redhat

Severity : Important

Publid Date: 2017-10-16T00:00:00Z

Links: CVE-2017-13081 - Bugzilla