Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2017-10-17 13:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-13081
Mitre link : CVE-2017-13081
CVE.ORG link : CVE-2017-13081
JSON object : View
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server
suse
- openstack_cloud
- linux_enterprise_server
- linux_enterprise_desktop
- linux_enterprise_point_of_sale
debian
- debian_linux
opensuse
- leap
w1.fi
- hostapd
- wpa_supplicant
canonical
- ubuntu_linux
freebsd
- freebsd
