[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

126348

 
 

909

 
 

102767

 
 

150

Paid content will be excluded from the download.


Download | Alert*
OVAL

Key reinstallation attack vulnerability when processing a Wireless Network Management (WNM) Sleep Mode Response frame - CVE-2017-13088

ID: oval:org.secpod.oval:def:42419Date: (C)2017-10-17   (M)2018-09-27
Class: VULNERABILITYFamily: unix




A new exploitation technique called key reinstallation attacks (KRACKs) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit this attack to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by reinstalling a previously used integrity group key (IGTK) during a Wireless Network Management (WNM) Sleep Mode handshake.

Platform:
Red Hat Enterprise Linux 7
Product:
wpa_supplicant
Reference:
CVE-2017-13088
CVE    1
CVE-2017-13088
CPE    22
cpe:/a:w1.fi:wpa_supplicant
cpe:/o:debian:debian_linux:8.0
cpe:/o:freebsd:freebsd
cpe:/o:debian:debian_linux:9.0
...

© SecPod Technologies