Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1150-1 | wpa security update |
![]() |
DSA-3999-1 | wpa security update |
![]() |
EUVD-2017-4600 | Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. |
![]() |
USN-3455-1 | wpa_supplicant and hostapd vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T18:58:12.560Z
Reserved: 2017-08-22T00:00:00
Link: CVE-2017-13082

No data.

Status : Deferred
Published: 2017-10-17T13:29:00.473
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-13082


No data.