[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-5230Date: (C)2008-11-25   (M)2023-12-22


The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 8.6
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
http://www.cisco.com/en/US/products/products_security_response09186a0080a30036.html
BID-32164
http://lists.immunitysec.com/pipermail/dailydave/2008-November/005413.html
http://arstechnica.com/articles/paedia/wpa-cracked.ars
http://dl.aircrack-ng.org/breakingwepandwpa.pdf
http://radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html
http://trac.aircrack-ng.org/svn/trunk/src/tkiptun-ng.c
http://www.aircrack-ng.org/doku.php?id=tkiptun-ng

CWE    1
CWE-310

© SecPod Technologies