W1.Fi

Wpa Supplicant

39 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.29%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

  • EPSS 0.91%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Exploit
  • EPSS 0.39%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, ...

  • EPSS 0.25%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

  • EPSS 1.16%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

  • EPSS 0.26%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

  • EPSS 0.81%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

  • EPSS 0.77%
  • Veröffentlicht 17.10.2017 02:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Exploit
  • EPSS 0.3%
  • Veröffentlicht 28.08.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

wpa_supplicant 2.0-16 does not properly check certificate subject name, which allows remote attackers to cause a man-in-the-middle attack.

  • EPSS 0.61%
  • Veröffentlicht 09.05.2016 10:59:41
  • Zuletzt bearbeitet 12.04.2025 10:46:40

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.