MEDIUM · 5.3

CVE-2017-13078

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points t...

Vulnerability Description

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

CVSS Score

5.3

MEDIUM

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
CanonicalUbuntu Linux14.04
DebianDebian Linux8.0
FreebsdFreebsdAll versions
OpensuseLeap42.2
RedhatEnterprise Linux Desktop7
RedhatEnterprise Linux Server7
W1.FiHostapd0.2.4
W1.FiWpa Supplicant0.2.4
SuseLinux Enterprise Desktop12
SuseLinux Enterprise Point Of Sale11
SuseLinux Enterprise Server11
SuseOpenstack Cloud6

Related Weaknesses (CWE)

References

FAQ

What is CVE-2017-13078?

CVE-2017-13078 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points t...

How severe is CVE-2017-13078?

CVE-2017-13078 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2017-13078?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Debian Debian Linux, Freebsd Freebsd, Opensuse Leap, Redhat Enterprise Linux Desktop.