Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1150-1 | wpa security update |
Debian DSA |
DSA-3999-1 | wpa security update |
EUVD |
EUVD-2017-4600 | Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. |
Ubuntu USN |
USN-3455-1 | wpa_supplicant and hostapd vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T18:58:12.560Z
Reserved: 2017-08-22T00:00:00
Link: CVE-2017-13082
No data.
Status : Deferred
Published: 2017-10-17T13:29:00.473
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-13082
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN