MEDIUM · 6.8

CVE-2017-13084

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, d...

Vulnerability Description

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS Score

6.8

MEDIUM

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
CanonicalUbuntu Linux14.04
DebianDebian Linux8.0
FreebsdFreebsdAll versions
OpensuseLeap42.2
RedhatEnterprise Linux Desktop7
RedhatEnterprise Linux Server7
W1.FiHostapd0.2.4
W1.FiWpa Supplicant0.2.4
SuseLinux Enterprise Desktop12
SuseLinux Enterprise Point Of Sale11
SuseLinux Enterprise Server11
SuseOpenstack Cloud6

Related Weaknesses (CWE)

References

FAQ

What is CVE-2017-13084?

CVE-2017-13084 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, d...

How severe is CVE-2017-13084?

CVE-2017-13084 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2017-13084?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Debian Debian Linux, Freebsd Freebsd, Opensuse Leap, Redhat Enterprise Linux Desktop.