5.3
CVE-2017-13081
- EPSS 0.25%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle cret@cert.org
- Teams Watchlist Login
- Unerledigt Login
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Canonical ≫ Ubuntu Linux Version14.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version16.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version17.04
Debian ≫ Debian Linux Version8.0
Debian ≫ Debian Linux Version9.0
Redhat ≫ Enterprise Linux Desktop Version7
Redhat ≫ Enterprise Linux Server Version7
W1.Fi ≫ Wpa Supplicant Version0.2.4
W1.Fi ≫ Wpa Supplicant Version0.2.5
W1.Fi ≫ Wpa Supplicant Version0.2.6
W1.Fi ≫ Wpa Supplicant Version0.2.7
W1.Fi ≫ Wpa Supplicant Version0.2.8
W1.Fi ≫ Wpa Supplicant Version0.3.7
W1.Fi ≫ Wpa Supplicant Version0.3.8
W1.Fi ≫ Wpa Supplicant Version0.3.9
W1.Fi ≫ Wpa Supplicant Version0.3.10
W1.Fi ≫ Wpa Supplicant Version0.3.11
W1.Fi ≫ Wpa Supplicant Version0.4.7
W1.Fi ≫ Wpa Supplicant Version0.4.8
W1.Fi ≫ Wpa Supplicant Version0.4.9
W1.Fi ≫ Wpa Supplicant Version0.4.10
W1.Fi ≫ Wpa Supplicant Version0.4.11
W1.Fi ≫ Wpa Supplicant Version0.5.7
W1.Fi ≫ Wpa Supplicant Version0.5.8
W1.Fi ≫ Wpa Supplicant Version0.5.9
W1.Fi ≫ Wpa Supplicant Version0.5.10
W1.Fi ≫ Wpa Supplicant Version0.5.11
W1.Fi ≫ Wpa Supplicant Version0.6.8
W1.Fi ≫ Wpa Supplicant Version0.6.9
W1.Fi ≫ Wpa Supplicant Version0.6.10
W1.Fi ≫ Wpa Supplicant Version0.7.3
W1.Fi ≫ Wpa Supplicant Version1.0
W1.Fi ≫ Wpa Supplicant Version1.1
W1.Fi ≫ Wpa Supplicant Version2.0
W1.Fi ≫ Wpa Supplicant Version2.1
W1.Fi ≫ Wpa Supplicant Version2.2
W1.Fi ≫ Wpa Supplicant Version2.3
W1.Fi ≫ Wpa Supplicant Version2.4
W1.Fi ≫ Wpa Supplicant Version2.5
W1.Fi ≫ Wpa Supplicant Version2.6
Suse ≫ Linux Enterprise Desktop Version12 Updatesp2
Suse ≫ Linux Enterprise Desktop Version12 Updatesp3
Suse ≫ Linux Enterprise Point Of Sale Version11 Updatesp3
Suse ≫ Linux Enterprise Server Version11 Updatesp3 SwPlatformltss
Suse ≫ Linux Enterprise Server Version11 Updatesp4
Suse ≫ Linux Enterprise Server Version12 SwEditionltss
Suse ≫ Openstack Cloud Version6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.25% | 0.482 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 1.6 | 3.6 |
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
|
nvd@nist.gov | 2.9 | 5.5 | 2.9 |
AV:A/AC:M/Au:N/C:N/I:P/A:N
|
CWE-323 Reusing a Nonce, Key Pair in Encryption
Nonces should be used for the present occasion and only once.
CWE-330 Use of Insufficiently Random Values
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.