CVE-2017-13086 (NVD)

2017-10-17

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Products Ubuntu_linux, Debian_linux, Freebsd, Leap, Enterprise_linux_desktop, Enterprise_linux_server, Linux_enterprise_desktop, Linux_enterprise_point_of_sale, Linux_enterprise_server, Openstack_cloud, Hostapd, Wpa_supplicant
Type Use of Insufficiently Random Values (CWE-330)
First patch - None (likely due to unavailable code)
Links http://www.securitytracker.com/id/1039573
http://www.securitytracker.com/id/1039577
https://access.redhat.com/security/vulnerabilities/kracks
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
http://www.ubuntu.com/usn/USN-3455-1