5.3
CVE-2017-13079
- EPSS 0.28%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle cret@cert.org
- Teams Watchlist Login
- Unerledigt Login
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Canonical ≫ Ubuntu Linux Version14.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version16.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version17.04
Debian ≫ Debian Linux Version8.0
Debian ≫ Debian Linux Version9.0
Redhat ≫ Enterprise Linux Desktop Version7
Redhat ≫ Enterprise Linux Server Version7
W1.Fi ≫ Wpa Supplicant Version0.2.4
W1.Fi ≫ Wpa Supplicant Version0.2.5
W1.Fi ≫ Wpa Supplicant Version0.2.6
W1.Fi ≫ Wpa Supplicant Version0.2.7
W1.Fi ≫ Wpa Supplicant Version0.2.8
W1.Fi ≫ Wpa Supplicant Version0.3.7
W1.Fi ≫ Wpa Supplicant Version0.3.8
W1.Fi ≫ Wpa Supplicant Version0.3.9
W1.Fi ≫ Wpa Supplicant Version0.3.10
W1.Fi ≫ Wpa Supplicant Version0.3.11
W1.Fi ≫ Wpa Supplicant Version0.4.7
W1.Fi ≫ Wpa Supplicant Version0.4.8
W1.Fi ≫ Wpa Supplicant Version0.4.9
W1.Fi ≫ Wpa Supplicant Version0.4.10
W1.Fi ≫ Wpa Supplicant Version0.4.11
W1.Fi ≫ Wpa Supplicant Version0.5.7
W1.Fi ≫ Wpa Supplicant Version0.5.8
W1.Fi ≫ Wpa Supplicant Version0.5.9
W1.Fi ≫ Wpa Supplicant Version0.5.10
W1.Fi ≫ Wpa Supplicant Version0.5.11
W1.Fi ≫ Wpa Supplicant Version0.6.8
W1.Fi ≫ Wpa Supplicant Version0.6.9
W1.Fi ≫ Wpa Supplicant Version0.6.10
W1.Fi ≫ Wpa Supplicant Version0.7.3
W1.Fi ≫ Wpa Supplicant Version1.0
W1.Fi ≫ Wpa Supplicant Version1.1
W1.Fi ≫ Wpa Supplicant Version2.0
W1.Fi ≫ Wpa Supplicant Version2.1
W1.Fi ≫ Wpa Supplicant Version2.2
W1.Fi ≫ Wpa Supplicant Version2.3
W1.Fi ≫ Wpa Supplicant Version2.4
W1.Fi ≫ Wpa Supplicant Version2.5
W1.Fi ≫ Wpa Supplicant Version2.6
Suse ≫ Linux Enterprise Desktop Version12 Updatesp2
Suse ≫ Linux Enterprise Desktop Version12 Updatesp3
Suse ≫ Linux Enterprise Point Of Sale Version11 Updatesp3
Suse ≫ Linux Enterprise Server Version11 Updatesp3 SwPlatformltss
Suse ≫ Linux Enterprise Server Version11 Updatesp4
Suse ≫ Linux Enterprise Server Version12 SwEditionltss
Suse ≫ Openstack Cloud Version6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.28% | 0.511 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 1.6 | 3.6 |
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
|
nvd@nist.gov | 2.9 | 5.5 | 2.9 |
AV:A/AC:M/Au:N/C:N/I:P/A:N
|
CWE-323 Reusing a Nonce, Key Pair in Encryption
Nonces should be used for the present occasion and only once.
CWE-330 Use of Insufficiently Random Values
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.