CVE-2017-13082
Publication date 16 October 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Status
Package | Ubuntu Release | Status |
---|---|---|
wpa | ||
16.04 LTS xenial |
Fixed 2.4-0ubuntu6.2
|
|
14.04 LTS trusty |
Fixed 2.1-0ubuntu1.5
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 · High |
Attack vector | Adjacent |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3455-1
- wpa_supplicant and hostapd vulnerabilities
- 16 October 2017