Informazioni sul CVE-2017-13080
N/A
CWE ID: CWE-323
Base Score (CVSS): N/A
CVE: CVE-2017-13080
Descrizione: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
Vettore di attacco
Punteggio CVSS
Il CVSS è un sistema di valutazione che misura la gravità di una vulnerabilità informatica considerando fattori come l’impatto potenziale, la probabilità di attacco e la facilità di esecuzione.
Punteggio Base (calcolato da AziendaSicura): 0.0 (None)
Riassunto: .
Dettaglio del Vettore
Metrica | Valore | Significato | Descrizione |
---|
Riferimenti esterni
- http://www.securitytracker.com/id/1039581
- https://support.apple.com/HT208221
- http://www.securityfocus.com/bid/101274
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- http://www.debian.org/security/2017/dsa-3999
- https://support.apple.com/HT208327
- http://www.securitytracker.com/id/1039578
- https://support.apple.com/HT208325
- https://access.redhat.com/security/vulnerabilities/kracks
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://access.redhat.com/errata/RHSA-2017:2911
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039572
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
- https://support.apple.com/HT208222
- https://support.apple.com/HT208334
- https://source.android.com/security/bulletin/2017-11-01
- https://security.gentoo.org/glsa/201711-03
- https://access.redhat.com/errata/RHSA-2017:2907
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
- https://www.krackattacks.com/
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1039573
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
- http://www.securitytracker.com/id/1039576
- https://cert.vde.com/en-us/advisories/vde-2017-003
- http://www.securitytracker.com/id/1039585
- http://www.kb.cert.org/vuls/id/228519
- https://support.apple.com/HT208220
- https://support.apple.com/HT208219
- https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://cert.vde.com/en-us/advisories/vde-2017-005
- http://www.securitytracker.com/id/1039703
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
- http://www.ubuntu.com/usn/USN-3455-1
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html
Prodotti interessati
- Wi-Fi Alliance – Wi-Fi Protected Access (WPA and WPA2)
Relazioni con altri prodotti
Produttore:Wi-Fi Alliance
Prodotto: Wi-Fi Protected Access (WPA and WPA2)
Anno: 2017
CWE: CWE-323
CVSS: 0.0