ID:

CVE-2017-13082 (NVD)

- Vulnerability Info (edit)
2017-10-17

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Products debian_linux, enterprise_linux_desktop, enterprise_linux_server, freebsd, hostapd, leap, linux_enterprise_desktop, linux_enterprise_point_of_sale, linux_enterprise_server, openstack_cloud, ubuntu_linux, wpa_supplicant
Type 7PK - Security Features (CWE-254)
First patch None
Patches https://github.com/vanhoefm/krackattacks-test-ap-ft
Links http://www.kb.cert.org/vuls/id/228519
https://source.android.com/security/bulletin/2017-11-01
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1066697
https://security.gentoo.org/glsa/201711-03
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
Annotation

Note:

No patch was assigned yet.