CVE-2017-13082 (NVD)

2017-10-17

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Products Ubuntu_linux, Debian_linux, Freebsd, Leap, Enterprise_linux_desktop, Enterprise_linux_server, Linux_enterprise_desktop, Linux_enterprise_point_of_sale, Linux_enterprise_server, Openstack_cloud, Hostapd, Wpa_supplicant
Type Use of Insufficiently Random Values (CWE-330)
First patch - None (likely due to unavailable code)
Links http://www.securityfocus.com/bid/101274
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1066697
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
http://www.debian.org/security/2017/dsa-3999