Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html cve-icon cve-icon
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt cve-icon cve-icon
http://www.debian.org/security/2017/dsa-3999 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/228519 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html cve-icon cve-icon
http://www.securityfocus.com/bid/101274 cve-icon cve-icon
http://www.securitytracker.com/id/1039570 cve-icon cve-icon
http://www.securitytracker.com/id/1039571 cve-icon cve-icon
http://www.securitytracker.com/id/1039573 cve-icon cve-icon
http://www.securitytracker.com/id/1039581 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3455-1 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2907 cve-icon cve-icon
https://access.redhat.com/security/vulnerabilities/kracks cve-icon cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf cve-icon cve-icon
https://cert.vde.com/en-us/advisories/vde-2017-005 cve-icon cve-icon
https://github.com/vanhoefm/krackattacks-test-ap-ft cve-icon cve-icon
https://ics-cert.us-cert.gov/advisories/ICSA-17-299-02 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2017-13082 cve-icon
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1066697 cve-icon cve-icon
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc cve-icon cve-icon
https://security.gentoo.org/glsa/201711-03 cve-icon cve-icon
https://source.android.com/security/bulletin/2017-11-01 cve-icon cve-icon
https://support.lenovo.com/us/en/product_security/LEN-17420 cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa cve-icon cve-icon
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt cve-icon cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2017-13082 cve-icon
https://www.krackattacks.com/ cve-icon cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2017-10-17T13:00:00

Updated: 2024-08-05T18:58:12.560Z

Reserved: 2017-08-22T00:00:00

Link: CVE-2017-13082

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-10-17T13:29:00.473

Modified: 2019-10-03T00:03:26.223

Link: CVE-2017-13082

cve-icon Redhat

Severity : Important

Publid Date: 2017-10-16T00:00:00Z

Links: CVE-2017-13082 - Bugzilla