DNA View

CVE-2017-13080

Low
Low Medium High Critical
CVSS Score
Published: Oct 17, 2017
Last Modified: Apr 20, 2025

Vulnerability Description

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

Known Affected Software

82 configuration(s) from 7 vendor(s)

ubuntu_linux
Version:
14.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
ubuntu_linux
Version:
17.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
ubuntu_linux
Version:
16.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
debian_linux
Version:
8.0
CPE:
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debian_linux
Version:
9.0
CPE:
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
freebsd
Version:
11.1
CPE:
cpe:2.3:o:freebsd:freebsd:11.1:p15:*:*:*:*:*:*
freebsd
Version:
10
CPE:
cpe:2.3:o:freebsd:freebsd:10:*:*:*:*:*:*:*
freebsd
Version:
11
CPE:
cpe:2.3:o:freebsd:freebsd:11:*:*:*:*:*:*:*
freebsd
Version:
10.4
CPE:
cpe:2.3:o:freebsd:freebsd:10.4:-:*:*:*:*:*:*
leap
Version:
42.3
CPE:
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
leap
Version:
42.2
CPE:
cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
enterprise_linux_server
Version:
7
CPE:
cpe:2.3:o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
enterprise_linux_desktop
Version:
7
CPE:
cpe:2.3:o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
linux_enterprise_server
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:*:*:*
linux_enterprise_server
Version:
11
CPE:
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:-:*:*:*
linux_enterprise_point_of_sale
Version:
11
CPE:
cpe:2.3:a:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
linux_enterprise_desktop
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp4:*:*:*:*:*:*
openstack_cloud
Version:
6
CPE:
cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*
hostapd
Version:
0.6.10
CPE:
cpe:2.3:a:w1.fi:hostapd:0.6.10:*:*:*:*:*:*:*
hostapd
Version:
0.3.9
CPE:
cpe:2.3:a:w1.fi:hostapd:0.3.9:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.2.7
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.2.7:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.3.9
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.3.9:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.4.9
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.4.9:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.4.10
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.4.10:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.6.9
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.6.9:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.2.8
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.2.8:*:*:*:*:*:*:*
wpa_supplicant
Version:
2.5
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:2.5:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.5.10
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.5.10:*:*:*:*:*:*:*
hostapd
Version:
2.1
CPE:
cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*
wpa_supplicant
Version:
2.4
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.3.11
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.3.11:*:*:*:*:*:*:*
hostapd
Version:
2.0
CPE:
cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.2.6
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.2.6:*:*:*:*:*:*:*
hostapd
Version:
2.6
CPE:
cpe:2.3:a:w1.fi:hostapd:2.6:*:*:*:*:*:*:*
wpa_supplicant
Version:
2.6
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:2.6:*:*:*:*:*:*:*
hostapd
Version:
0.5.10
CPE:
cpe:2.3:a:w1.fi:hostapd:0.5.10:*:*:*:*:*:*:*
hostapd
Version:
0.4.10
CPE:
cpe:2.3:a:w1.fi:hostapd:0.4.10:*:*:*:*:*:*:*
hostapd
Version:
0.5.9
CPE:
cpe:2.3:a:w1.fi:hostapd:0.5.9:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.2.5
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.2.5:*:*:*:*:*:*:*
hostapd
Version:
2.5
CPE:
cpe:2.3:a:w1.fi:hostapd:2.5:*:*:*:*:*:*:*
hostapd
Version:
0.3.11
CPE:
cpe:2.3:a:w1.fi:hostapd:0.3.11:*:*:*:*:*:*:*
hostapd
Version:
0.7.3
CPE:
cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*
wpa_supplicant
Version:
1.1
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
hostapd
Version:
0.5.8
CPE:
cpe:2.3:a:w1.fi:hostapd:0.5.8:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.5.11
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.5.11:*:*:*:*:*:*:*
hostapd
Version:
0.3.7
CPE:
cpe:2.3:a:w1.fi:hostapd:0.3.7:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.4.8
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.4.8:*:*:*:*:*:*:*
hostapd
Version:
0.4.8
CPE:
cpe:2.3:a:w1.fi:hostapd:0.4.8:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.5.7
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.5.7:*:*:*:*:*:*:*
hostapd
Version:
0.2.4
CPE:
cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*
hostapd
Version:
1.0
CPE:
cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.5.9
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.5.9:*:*:*:*:*:*:*
hostapd
Version:
0.2.6
CPE:
cpe:2.3:a:w1.fi:hostapd:0.2.6:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.6.8
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.6.8:*:*:*:*:*:*:*
hostapd
Version:
2.3
CPE:
cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.7.3
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3:*:*:*:*:*:*:*
hostapd
Version:
0.5.11
CPE:
cpe:2.3:a:w1.fi:hostapd:0.5.11:*:*:*:*:*:*:*
wpa_supplicant
Version:
2.0
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
hostapd
Version:
0.2.8
CPE:
cpe:2.3:a:w1.fi:hostapd:0.2.8:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.3.7
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.3.7:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.3.10
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.3.10:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.5.8
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.5.8:*:*:*:*:*:*:*
hostapd
Version:
0.3.10
CPE:
cpe:2.3:a:w1.fi:hostapd:0.3.10:*:*:*:*:*:*:*
hostapd
Version:
0.5.7
CPE:
cpe:2.3:a:w1.fi:hostapd:0.5.7:*:*:*:*:*:*:*
hostapd
Version:
0.6.8
CPE:
cpe:2.3:a:w1.fi:hostapd:0.6.8:*:*:*:*:*:*:*
wpa_supplicant
Version:
1.0
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.4.11
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.4.11:*:*:*:*:*:*:*
hostapd
Version:
0.2.5
CPE:
cpe:2.3:a:w1.fi:hostapd:0.2.5:*:*:*:*:*:*:*
hostapd
Version:
0.6.9
CPE:
cpe:2.3:a:w1.fi:hostapd:0.6.9:*:*:*:*:*:*:*
hostapd
Version:
0.4.9
CPE:
cpe:2.3:a:w1.fi:hostapd:0.4.9:*:*:*:*:*:*:*
wpa_supplicant
Version:
2.3
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.4.7
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.4.7:*:*:*:*:*:*:*
hostapd
Version:
1.1
CPE:
cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*
wpa_supplicant
Version:
2.1
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.2.4
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.6.10
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.6.10:*:*:*:*:*:*:*
hostapd
Version:
2.2
CPE:
cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*
wpa_supplicant
Version:
2.2
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
hostapd
Version:
0.4.11
CPE:
cpe:2.3:a:w1.fi:hostapd:0.4.11:*:*:*:*:*:*:*
hostapd
Version:
2.4
CPE:
cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*
wpa_supplicant
Version:
0.3.8
CPE:
cpe:2.3:a:w1.fi:wpa_supplicant:0.3.8:*:*:*:*:*:*:*
hostapd
Version:
0.4.7
CPE:
cpe:2.3:a:w1.fi:hostapd:0.4.7:*:*:*:*:*:*:*
This vulnerability affects 82 software configuration(s). Ensure you patch all affected systems.

References & Resources

Severity Details

out of 10.0
Low

Weakness Type (CWE)

CWE-323

Reusing a Nonce, Key Pair in Encryption

Description
Nonces should be used for the present occasion and only once.
Exploit Likelihood
High
Typical Severity
High
Abstraction Level
Base

Key Information

Published Date
October 17, 2017