First published: Tue Oct 17 2017(Updated: )
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.04 | |
Debian | =8.0 | |
Debian | =9.0 | |
FreeBSD FreeBSD | ||
FreeBSD FreeBSD | =10 | |
FreeBSD FreeBSD | =10.4 | |
FreeBSD FreeBSD | =11 | |
FreeBSD FreeBSD | =11.1 | |
openSUSE | =42.2 | |
openSUSE | =42.3 | |
redhat enterprise Linux desktop | =7 | |
redhat enterprise Linux server | =7 | |
w1.fi hostapd | =0.2.4 | |
w1.fi hostapd | =0.2.5 | |
w1.fi hostapd | =0.2.6 | |
w1.fi hostapd | =0.2.8 | |
w1.fi hostapd | =0.3.7 | |
w1.fi hostapd | =0.3.9 | |
w1.fi hostapd | =0.3.10 | |
w1.fi hostapd | =0.3.11 | |
w1.fi hostapd | =0.4.7 | |
w1.fi hostapd | =0.4.8 | |
w1.fi hostapd | =0.4.9 | |
w1.fi hostapd | =0.4.10 | |
w1.fi hostapd | =0.4.11 | |
w1.fi hostapd | =0.5.7 | |
w1.fi hostapd | =0.5.8 | |
w1.fi hostapd | =0.5.9 | |
w1.fi hostapd | =0.5.10 | |
w1.fi hostapd | =0.5.11 | |
w1.fi hostapd | =0.6.8 | |
w1.fi hostapd | =0.6.9 | |
w1.fi hostapd | =0.6.10 | |
w1.fi hostapd | =0.7.3 | |
w1.fi hostapd | =1.0 | |
w1.fi hostapd | =1.1 | |
w1.fi hostapd | =2.0 | |
w1.fi hostapd | =2.1 | |
w1.fi hostapd | =2.2 | |
w1.fi hostapd | =2.3 | |
w1.fi hostapd | =2.4 | |
w1.fi hostapd | =2.5 | |
w1.fi hostapd | =2.6 | |
wpa_supplicant | =0.2.4 | |
wpa_supplicant | =0.2.5 | |
wpa_supplicant | =0.2.6 | |
wpa_supplicant | =0.2.7 | |
wpa_supplicant | =0.2.8 | |
wpa_supplicant | =0.3.7 | |
wpa_supplicant | =0.3.8 | |
wpa_supplicant | =0.3.9 | |
wpa_supplicant | =0.3.10 | |
wpa_supplicant | =0.3.11 | |
wpa_supplicant | =0.4.7 | |
wpa_supplicant | =0.4.8 | |
wpa_supplicant | =0.4.9 | |
wpa_supplicant | =0.4.10 | |
wpa_supplicant | =0.4.11 | |
wpa_supplicant | =0.5.7 | |
wpa_supplicant | =0.5.8 | |
wpa_supplicant | =0.5.9 | |
wpa_supplicant | =0.5.10 | |
wpa_supplicant | =0.5.11 | |
wpa_supplicant | =0.6.8 | |
wpa_supplicant | =0.6.9 | |
wpa_supplicant | =0.6.10 | |
wpa_supplicant | =0.7.3 | |
wpa_supplicant | =1.0 | |
wpa_supplicant | =1.1 | |
wpa_supplicant | =2.0 | |
wpa_supplicant | =2.1 | |
wpa_supplicant | =2.2 | |
wpa_supplicant | =2.3 | |
wpa_supplicant | =2.4 | |
wpa_supplicant | =2.5 | |
wpa_supplicant | =2.6 | |
SUSE Linux Enterprise Desktop with Beagle | =12-sp2 | |
SUSE Linux Enterprise Desktop with Beagle | =12-sp3 | |
SUSE Linux Enterprise Point of Sale | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12 | |
openSUSE OpenStack Cloud | =6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13084 is classified as a high severity vulnerability due to its potential to allow attackers to replay, decrypt, or spoof frames in wireless networks.
To mitigate CVE-2017-13084, ensure that your devices are updated to the latest firmware or software versions that include patches for this vulnerability.
CVE-2017-13084 affects various systems including certain versions of Ubuntu Linux, Debian GNU/Linux, FreeBSD, openSUSE, and Red Hat Enterprise Linux.
CVE-2017-13084 allows for replay, decryption, and spoofing attacks during the PeerKey handshake, posing serious security risks in wireless communications.
You can verify if your system is vulnerable to CVE-2017-13084 by checking the installed versions of the affected software and cross-referencing them with the vulnerability's details.