Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
freebsd freebsd 11 |
||
freebsd freebsd 11.1 |
||
redhat enterprise linux desktop 7 |
||
freebsd freebsd |
||
canonical ubuntu linux 17.04 |
||
canonical ubuntu linux 16.04 |
||
freebsd freebsd 10 |
||
freebsd freebsd 10.4 |
||
opensuse leap 42.3 |
||
opensuse leap 42.2 |
||
debian debian linux 9.0 |
||
debian debian linux 8.0 |
||
canonical ubuntu linux 14.04 |
||
redhat enterprise linux server 7 |
||
w1.fi hostapd 2.3 |
||
w1.fi hostapd 2.2 |
||
w1.fi hostapd 0.6.9 |
||
w1.fi hostapd 0.6.8 |
||
w1.fi hostapd 0.4.10 |
||
w1.fi hostapd 0.4.9 |
||
w1.fi hostapd 0.4.8 |
||
w1.fi hostapd 0.2.6 |
||
w1.fi hostapd 0.2.5 |
||
w1.fi wpa supplicant 2.1 |
||
w1.fi wpa supplicant 2.0 |
||
w1.fi wpa supplicant 0.5.10 |
||
w1.fi wpa supplicant 0.5.9 |
||
w1.fi wpa supplicant 0.4.7 |
||
w1.fi wpa supplicant 0.3.11 |
||
w1.fi wpa supplicant 0.2.6 |
||
w1.fi wpa supplicant 0.2.5 |
||
w1.fi hostapd 2.6 |
||
w1.fi hostapd 1.1 |
||
w1.fi hostapd 1.0 |
||
w1.fi hostapd 0.5.9 |
||
w1.fi hostapd 0.5.8 |
||
w1.fi hostapd 0.3.10 |
||
w1.fi hostapd 0.3.9 |
||
w1.fi wpa supplicant 2.5 |
||
w1.fi wpa supplicant 2.4 |
||
w1.fi wpa supplicant 0.7.3 |
||
w1.fi wpa supplicant 0.6.10 |
||
w1.fi wpa supplicant 0.4.11 |
||
w1.fi wpa supplicant 0.4.10 |
||
w1.fi wpa supplicant 0.3.8 |
||
w1.fi wpa supplicant 0.3.7 |
||
w1.fi hostapd 2.5 |
||
w1.fi hostapd 2.4 |
||
w1.fi hostapd 0.7.3 |
||
w1.fi hostapd 0.6.10 |
||
w1.fi hostapd 0.5.7 |
||
w1.fi hostapd 0.4.11 |
||
w1.fi hostapd 0.3.7 |
||
w1.fi hostapd 0.2.8 |
||
w1.fi wpa supplicant 2.3 |
||
w1.fi wpa supplicant 2.2 |
||
w1.fi wpa supplicant 0.6.9 |
||
w1.fi wpa supplicant 0.6.8 |
||
w1.fi wpa supplicant 0.5.11 |
||
w1.fi wpa supplicant 0.4.9 |
||
w1.fi wpa supplicant 0.4.8 |
||
w1.fi wpa supplicant 0.2.8 |
||
w1.fi wpa supplicant 0.2.7 |
||
w1.fi hostapd 2.1 |
||
w1.fi hostapd 2.0 |
||
w1.fi hostapd 0.5.11 |
||
w1.fi hostapd 0.5.10 |
||
w1.fi hostapd 0.4.7 |
||
w1.fi hostapd 0.3.11 |
||
w1.fi hostapd 0.2.4 |
||
w1.fi wpa supplicant 2.6 |
||
w1.fi wpa supplicant 1.1 |
||
w1.fi wpa supplicant 1.0 |
||
w1.fi wpa supplicant 0.5.8 |
||
w1.fi wpa supplicant 0.5.7 |
||
w1.fi wpa supplicant 0.3.10 |
||
w1.fi wpa supplicant 0.3.9 |
||
w1.fi wpa supplicant 0.2.4 |
||
suse linux enterprise server 12 |
||
suse openstack cloud 6 |
||
suse linux enterprise point of sale 11 |
||
suse linux enterprise server 11 |
||
suse linux enterprise desktop 12 |
Strap yourselves in readers, Wi-Fi may be cooked
Updated A promo for the upcoming Association for Computing Machinery security conference has set infosec types all a-Twitter over the apparent cryptographic death of the WPA2 authentication scheme widely used to secure Wi-Fi connections. The authors of the paper have everything ready except the details of their disclosure: acceptance at the ACM Conference on Computer and Communications Security (CCS) for their paper Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, a timeslot (during the ...