First published: Tue Oct 17 2017(Updated: )
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.04 | |
Debian | =8.0 | |
Debian | =9.0 | |
FreeBSD FreeBSD | ||
FreeBSD FreeBSD | =10 | |
FreeBSD FreeBSD | =10.4 | |
FreeBSD FreeBSD | =11 | |
FreeBSD FreeBSD | =11.1 | |
openSUSE | =42.2 | |
openSUSE | =42.3 | |
redhat enterprise Linux desktop | =7 | |
redhat enterprise Linux server | =7 | |
w1.fi hostapd | =0.2.4 | |
w1.fi hostapd | =0.2.5 | |
w1.fi hostapd | =0.2.6 | |
w1.fi hostapd | =0.2.8 | |
w1.fi hostapd | =0.3.7 | |
w1.fi hostapd | =0.3.9 | |
w1.fi hostapd | =0.3.10 | |
w1.fi hostapd | =0.3.11 | |
w1.fi hostapd | =0.4.7 | |
w1.fi hostapd | =0.4.8 | |
w1.fi hostapd | =0.4.9 | |
w1.fi hostapd | =0.4.10 | |
w1.fi hostapd | =0.4.11 | |
w1.fi hostapd | =0.5.7 | |
w1.fi hostapd | =0.5.8 | |
w1.fi hostapd | =0.5.9 | |
w1.fi hostapd | =0.5.10 | |
w1.fi hostapd | =0.5.11 | |
w1.fi hostapd | =0.6.8 | |
w1.fi hostapd | =0.6.9 | |
w1.fi hostapd | =0.6.10 | |
w1.fi hostapd | =0.7.3 | |
w1.fi hostapd | =1.0 | |
w1.fi hostapd | =1.1 | |
w1.fi hostapd | =2.0 | |
w1.fi hostapd | =2.1 | |
w1.fi hostapd | =2.2 | |
w1.fi hostapd | =2.3 | |
w1.fi hostapd | =2.4 | |
w1.fi hostapd | =2.5 | |
w1.fi hostapd | =2.6 | |
wpa_supplicant | =0.2.4 | |
wpa_supplicant | =0.2.5 | |
wpa_supplicant | =0.2.6 | |
wpa_supplicant | =0.2.7 | |
wpa_supplicant | =0.2.8 | |
wpa_supplicant | =0.3.7 | |
wpa_supplicant | =0.3.8 | |
wpa_supplicant | =0.3.9 | |
wpa_supplicant | =0.3.10 | |
wpa_supplicant | =0.3.11 | |
wpa_supplicant | =0.4.7 | |
wpa_supplicant | =0.4.8 | |
wpa_supplicant | =0.4.9 | |
wpa_supplicant | =0.4.10 | |
wpa_supplicant | =0.4.11 | |
wpa_supplicant | =0.5.7 | |
wpa_supplicant | =0.5.8 | |
wpa_supplicant | =0.5.9 | |
wpa_supplicant | =0.5.10 | |
wpa_supplicant | =0.5.11 | |
wpa_supplicant | =0.6.8 | |
wpa_supplicant | =0.6.9 | |
wpa_supplicant | =0.6.10 | |
wpa_supplicant | =0.7.3 | |
wpa_supplicant | =1.0 | |
wpa_supplicant | =1.1 | |
wpa_supplicant | =2.0 | |
wpa_supplicant | =2.1 | |
wpa_supplicant | =2.2 | |
wpa_supplicant | =2.3 | |
wpa_supplicant | =2.4 | |
wpa_supplicant | =2.5 | |
wpa_supplicant | =2.6 | |
SUSE Linux Enterprise Desktop with Beagle | =12-sp2 | |
SUSE Linux Enterprise Desktop with Beagle | =12-sp3 | |
SUSE Linux Enterprise Point of Sale | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12 | |
openSUSE OpenStack Cloud | =6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13081 has a critical severity rating due to the potential for remote exploitation.
To fix CVE-2017-13081, you should apply the latest patches provided by your operating system vendor.
CVE-2017-13081 affects various versions of Android, Ubuntu, Debian, FreeBSD, and openSUSE, among others.
Yes, CVE-2017-13081 can be exploited by an attacker within radio range to spoof frames from access points.
CVE-2017-13081 is a vulnerability in the Wi-Fi Protected Access (WPA and WPA2) protocols.