Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
freebsd freebsd 10.4 |
||
canonical ubuntu linux 17.04 |
||
canonical ubuntu linux 16.04 |
||
debian debian linux 8.0 |
||
freebsd freebsd 11 |
||
redhat enterprise linux desktop 7 |
||
freebsd freebsd |
||
freebsd freebsd 11.1 |
||
freebsd freebsd 10 |
||
opensuse leap 42.3 |
||
opensuse leap 42.2 |
||
debian debian linux 9.0 |
||
canonical ubuntu linux 14.04 |
||
redhat enterprise linux server 7 |
||
w1.fi hostapd 2.6 |
||
w1.fi hostapd 1.1 |
||
w1.fi hostapd 1.0 |
||
w1.fi hostapd 0.5.8 |
||
w1.fi hostapd 0.5.7 |
||
w1.fi hostapd 0.3.10 |
||
w1.fi hostapd 0.3.9 |
||
w1.fi wpa supplicant 2.5 |
||
w1.fi wpa supplicant 2.4 |
||
w1.fi wpa supplicant 0.6.10 |
||
w1.fi wpa supplicant 0.6.9 |
||
w1.fi wpa supplicant 0.4.11 |
||
w1.fi wpa supplicant 0.4.10 |
||
w1.fi wpa supplicant 0.3.8 |
||
w1.fi wpa supplicant 0.3.7 |
||
w1.fi hostapd 2.3 |
||
w1.fi hostapd 2.2 |
||
w1.fi hostapd 0.6.9 |
||
w1.fi hostapd 0.6.8 |
||
w1.fi hostapd 0.4.9 |
||
w1.fi hostapd 0.4.8 |
||
w1.fi hostapd 0.2.6 |
||
w1.fi hostapd 0.2.5 |
||
w1.fi wpa supplicant 2.1 |
||
w1.fi wpa supplicant 2.0 |
||
w1.fi wpa supplicant 1.1 |
||
w1.fi wpa supplicant 0.5.10 |
||
w1.fi wpa supplicant 0.5.9 |
||
w1.fi wpa supplicant 0.4.7 |
||
w1.fi wpa supplicant 0.3.11 |
||
w1.fi wpa supplicant 0.2.5 |
||
w1.fi wpa supplicant 0.2.4 |
||
w1.fi hostapd 2.1 |
||
w1.fi hostapd 2.0 |
||
w1.fi hostapd 0.5.11 |
||
w1.fi hostapd 0.5.10 |
||
w1.fi hostapd 0.5.9 |
||
w1.fi hostapd 0.4.7 |
||
w1.fi hostapd 0.3.11 |
||
w1.fi hostapd 0.2.4 |
||
w1.fi wpa supplicant 2.6 |
||
w1.fi wpa supplicant 1.0 |
||
w1.fi wpa supplicant 0.7.3 |
||
w1.fi wpa supplicant 0.5.8 |
||
w1.fi wpa supplicant 0.5.7 |
||
w1.fi wpa supplicant 0.3.10 |
||
w1.fi wpa supplicant 0.3.9 |
||
w1.fi hostapd 2.5 |
||
w1.fi hostapd 2.4 |
||
w1.fi hostapd 0.7.3 |
||
w1.fi hostapd 0.6.10 |
||
w1.fi hostapd 0.4.11 |
||
w1.fi hostapd 0.4.10 |
||
w1.fi hostapd 0.3.7 |
||
w1.fi hostapd 0.2.8 |
||
w1.fi wpa supplicant 2.3 |
||
w1.fi wpa supplicant 2.2 |
||
w1.fi wpa supplicant 0.6.8 |
||
w1.fi wpa supplicant 0.5.11 |
||
w1.fi wpa supplicant 0.4.9 |
||
w1.fi wpa supplicant 0.4.8 |
||
w1.fi wpa supplicant 0.2.8 |
||
w1.fi wpa supplicant 0.2.7 |
||
w1.fi wpa supplicant 0.2.6 |
||
suse linux enterprise server 11 |
||
suse linux enterprise server 12 |
||
suse openstack cloud 6 |
||
suse linux enterprise point of sale 11 |
||
suse linux enterprise desktop 12 |
Update your firmware ASAP to avoid being hacked Google's answer to the Pixel 2 XL CRT-style screen burn in: Lower the brightness
Google has released its November security update for Android, addressing a bag of security holes. You should install them as soon as they are available for your phone, tablet and other gadgets. Depending on your mobile carrier and device manufacturer, they may arrive immediately, soon, late or never. Among the holes covered by the release is the KRACK Wi-Fi key reinstallation flaw that made headlines last month after researchers described how the flaw could potentially allow eavesdropping on nea...
Strap yourselves in readers, Wi-Fi may be cooked
Updated A promo for the upcoming Association for Computing Machinery security conference has set infosec types all a-Twitter over the apparent cryptographic death of the WPA2 authentication scheme widely used to secure Wi-Fi connections. The authors of the paper have everything ready except the details of their disclosure: acceptance at the ACM Conference on Computer and Communications Security (CCS) for their paper Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, a timeslot (during the ...