Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2017-13084 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue did not affect the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 5, 6, and 7, as wpa_supplicant's implementation of the PeerKey handshake mechanism is incomplete and does not allow the installation of a key into the driver.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 8.1 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
Attack Vector | Adjacent Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | None |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | wpa_supplicant | Not affected |
Red Hat Enterprise Linux 6 | wpa_supplicant | Not affected |
Red Hat Enterprise Linux 5 | wpa_supplicant | Not affected |