Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1150-1 | wpa security update |
Debian DSA |
DSA-3999-1 | wpa security update |
EUVD |
EUVD-2017-4605 | Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients. |
Ubuntu USN |
USN-3455-1 | wpa_supplicant and hostapd vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T18:58:12.354Z
Reserved: 2017-08-22T00:00:00.000Z
Link: CVE-2017-13087
No data.
Status : Deferred
Published: 2017-10-17T13:29:00.600
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-13087
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN