CVE-2017-13084

CWE-323CWE-330CWE-3208 documents8 sources
Severity
6.8MEDIUM
EPSS
1.2%
top 20.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 17
Latest updateMay 13

Description

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS vector

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 1.6 | Impact: 5.2

Affected Packages10 packages

NVDopensuse/leap42.2, 42.3+1
NVDw1.fi/hostapd31 versions+30
NVDw1.fi/wpa_supplicant33 versions+32

Also affects: Freebsd 10, 10.4, 11, 11.1, Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 17.04

🔴Vulnerability Details

3
GHSA
GHSA-mxrv-cp62-8842: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, al2022-05-13
CVEList
CVE-2017-13084: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, al2017-10-17
OSV
CVE-2017-13084: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, al2017-10-17

📋Vendor Advisories

3
Cisco
Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II2017-10-16
Red Hat
wpa_supplicant: reinstallation of the STK key in the PeerKey handshake2017-10-16
Debian
CVE-2017-13084: wpa - Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-St...2017

💬Community

1
Bugzilla
CVE-2017-13084 wpa_supplicant: reinstallation of the STK key in the PeerKey handshake2017-10-10
CVE-2017-13084 (MEDIUM CVSS 6.8) | Wi-Fi Protected Access (WPA and WPA | cvebase.io