Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2017-13080

PUBLISHED 05.08.2024

CNA: certcc

Обновлено: 10.11.2020
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

CWE

Идентификатор Описание
CWE-323 CWE-323 Reusing a Nonce, Key pair in encryption

БДУ ФСТЭК

Идентификатор Описание
BDU:2017-02266 Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (group key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети

Доп. Информация

Product Status

Wi-Fi Protected Access (WPA and WPA2)
Product: Wi-Fi Protected Access (WPA and WPA2)
Vendor: Wi-Fi Alliance
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версии WPA affected
Наблюдалось в версии WPA2 affected
 

Ссылки

http://www.securitytracker.com/id/1039581
https://support.apple.com/HT208221
http://www.securityfocus.com/bid/101274
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
http://www.debian.org/security/2017/dsa-3999
https://support.apple.com/HT208327
http://www.securitytracker.com/id/1039578
https://support.apple.com/HT208325
https://access.redhat.com/security/vulnerabilities/kracks
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
https://access.redhat.com/errata/RHSA-2017:2911
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
http://www.securitytracker.com/id/1039577
http://www.securitytracker.com/id/1039572
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
https://support.apple.com/HT208222
https://support.apple.com/HT208334
https://source.android.com/security/bulletin/2017-11-01
https://security.gentoo.org/glsa/201711-03
https://access.redhat.com/errata/RHSA-2017:2907
https://support.lenovo.com/us/en/product_security/LEN-17420
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
https://www.krackattacks.com/
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securitytracker.com/id/1039573
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
http://www.securitytracker.com/id/1039576
https://cert.vde.com/en-us/advisories/vde-2017-003
http://www.securitytracker.com/id/1039585
http://www.kb.cert.org/vuls/id/228519
https://support.apple.com/HT208220
https://support.apple.com/HT208219
https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
https://cert.vde.com/en-us/advisories/vde-2017-005
http://www.securitytracker.com/id/1039703
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
http://www.ubuntu.com/usn/USN-3455-1
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html

CVE Program Container

Обновлено: 05.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

http://www.securitytracker.com/id/1039581
https://support.apple.com/HT208221
http://www.securityfocus.com/bid/101274
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
http://www.debian.org/security/2017/dsa-3999
https://support.apple.com/HT208327
http://www.securitytracker.com/id/1039578
https://support.apple.com/HT208325
https://access.redhat.com/security/vulnerabilities/kracks
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
https://access.redhat.com/errata/RHSA-2017:2911
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
http://www.securitytracker.com/id/1039577
http://www.securitytracker.com/id/1039572
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
https://support.apple.com/HT208222
https://support.apple.com/HT208334
https://source.android.com/security/bulletin/2017-11-01
https://security.gentoo.org/glsa/201711-03
https://access.redhat.com/errata/RHSA-2017:2907
https://support.lenovo.com/us/en/product_security/LEN-17420
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
https://www.krackattacks.com/
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securitytracker.com/id/1039573
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
http://www.securitytracker.com/id/1039576
https://cert.vde.com/en-us/advisories/vde-2017-003
http://www.securitytracker.com/id/1039585
http://www.kb.cert.org/vuls/id/228519
https://support.apple.com/HT208220
https://support.apple.com/HT208219
https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
https://cert.vde.com/en-us/advisories/vde-2017-005
http://www.securitytracker.com/id/1039703
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
http://www.ubuntu.com/usn/USN-3455-1
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.