5.4
CVSSv2

CVE-2017-13084

Published: 17/10/2017 Updated: 03/10/2019
CVSS v2 Base Score: 5.4 | Impact Score: 6.4 | Exploitability Score: 5.5
CVSS v3 Base Score: 6.8 | Impact Score: 5.2 | Exploitability Score: 1.6
VMScore: 483
Vector: AV:A/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Vulnerable Product Search on Vulmon Subscribe to Product

freebsd freebsd 11

freebsd freebsd 11.1

redhat enterprise linux desktop 7

freebsd freebsd

canonical ubuntu linux 17.04

canonical ubuntu linux 16.04

freebsd freebsd 10

freebsd freebsd 10.4

opensuse leap 42.3

opensuse leap 42.2

debian debian linux 9.0

debian debian linux 8.0

canonical ubuntu linux 14.04

redhat enterprise linux server 7

w1.fi hostapd 2.3

w1.fi hostapd 2.2

w1.fi hostapd 0.6.9

w1.fi hostapd 0.6.8

w1.fi hostapd 0.4.10

w1.fi hostapd 0.4.9

w1.fi hostapd 0.4.8

w1.fi hostapd 0.2.6

w1.fi hostapd 0.2.5

w1.fi wpa supplicant 2.1

w1.fi wpa supplicant 2.0

w1.fi wpa supplicant 0.5.10

w1.fi wpa supplicant 0.5.9

w1.fi wpa supplicant 0.4.7

w1.fi wpa supplicant 0.3.11

w1.fi wpa supplicant 0.2.6

w1.fi wpa supplicant 0.2.5

w1.fi hostapd 2.6

w1.fi hostapd 1.1

w1.fi hostapd 1.0

w1.fi hostapd 0.5.9

w1.fi hostapd 0.5.8

w1.fi hostapd 0.3.10

w1.fi hostapd 0.3.9

w1.fi wpa supplicant 2.5

w1.fi wpa supplicant 2.4

w1.fi wpa supplicant 0.7.3

w1.fi wpa supplicant 0.6.10

w1.fi wpa supplicant 0.4.11

w1.fi wpa supplicant 0.4.10

w1.fi wpa supplicant 0.3.8

w1.fi wpa supplicant 0.3.7

w1.fi hostapd 2.5

w1.fi hostapd 2.4

w1.fi hostapd 0.7.3

w1.fi hostapd 0.6.10

w1.fi hostapd 0.5.7

w1.fi hostapd 0.4.11

w1.fi hostapd 0.3.7

w1.fi hostapd 0.2.8

w1.fi wpa supplicant 2.3

w1.fi wpa supplicant 2.2

w1.fi wpa supplicant 0.6.9

w1.fi wpa supplicant 0.6.8

w1.fi wpa supplicant 0.5.11

w1.fi wpa supplicant 0.4.9

w1.fi wpa supplicant 0.4.8

w1.fi wpa supplicant 0.2.8

w1.fi wpa supplicant 0.2.7

w1.fi hostapd 2.1

w1.fi hostapd 2.0

w1.fi hostapd 0.5.11

w1.fi hostapd 0.5.10

w1.fi hostapd 0.4.7

w1.fi hostapd 0.3.11

w1.fi hostapd 0.2.4

w1.fi wpa supplicant 2.6

w1.fi wpa supplicant 1.1

w1.fi wpa supplicant 1.0

w1.fi wpa supplicant 0.5.8

w1.fi wpa supplicant 0.5.7

w1.fi wpa supplicant 0.3.10

w1.fi wpa supplicant 0.3.9

w1.fi wpa supplicant 0.2.4

suse linux enterprise server 12

suse openstack cloud 6

suse linux enterprise point of sale 11

suse linux enterprise server 11

suse linux enterprise desktop 12

Vendor Advisories

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames ...
A vulnerability has been discovered that allows reinstallation of the short term key (STK) in the PeerKey handshake ...
On October 16, 2017, a research paper with the title “Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2” was made publicly available This paper discusses seven vulnerabilities affecting session key negotiation in both the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols These vulnerabilities may allow the ...

Recent Articles

WPA2 security in trouble as KRACK Belgian boffins tease key reinstallation bug
The Register • Richard Chirgwin • 16 Oct 2017

Strap yourselves in readers, Wi-Fi may be cooked

Updated A promo for the upcoming Association for Computing Machinery security conference has set infosec types all a-Twitter over the apparent cryptographic death of the WPA2 authentication scheme widely used to secure Wi-Fi connections. The authors of the paper have everything ready except the details of their disclosure: acceptance at the ACM Conference on Computer and Communications Security (CCS) for their paper Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, a timeslot (during the ...