MEDIUM · 5.3

CVE-2017-13088

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response fram...

Vulnerability Description

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.

CVSS Score

5.3

MEDIUM

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
CanonicalUbuntu Linux14.04
DebianDebian Linux8.0
FreebsdFreebsdAll versions
OpensuseLeap42.2
RedhatEnterprise Linux Desktop7
RedhatEnterprise Linux Server7
W1.FiHostapd0.2.4
W1.FiWpa Supplicant0.2.4
SuseLinux Enterprise Desktop12
SuseLinux Enterprise Point Of Sale11
SuseLinux Enterprise Server11
SuseOpenstack Cloud6

Related Weaknesses (CWE)

References

FAQ

What is CVE-2017-13088?

CVE-2017-13088 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response fram...

How severe is CVE-2017-13088?

CVE-2017-13088 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2017-13088?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Debian Debian Linux, Freebsd Freebsd, Opensuse Leap, Redhat Enterprise Linux Desktop.