CVE Vulnerabilities

CVE-2017-13077

Use of Insufficiently Random Values

Published: Oct 17, 2017 | Modified: Apr 20, 2025
CVSS 3.x
6.8
MEDIUM
Source:
NVD
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
5.4 MEDIUM
AV:A/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.1 IMPORTANT
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Weakness

The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.

Affected Software

NameVendorStart VersionEnd Version
Ubuntu_linuxCanonical14.04 (including)14.04 (including)
Ubuntu_linuxCanonical16.04 (including)16.04 (including)
Ubuntu_linuxCanonical17.04 (including)17.04 (including)
Debian_linuxDebian8.0 (including)8.0 (including)
Debian_linuxDebian9.0 (including)9.0 (including)
FreebsdFreebsd**
FreebsdFreebsd10 (including)10 (including)
FreebsdFreebsd10.4 (including)10.4 (including)
FreebsdFreebsd11 (including)11 (including)
FreebsdFreebsd11.1 (including)11.1 (including)
LeapOpensuse42.2 (including)42.2 (including)
LeapOpensuse42.3 (including)42.3 (including)
Enterprise_linux_desktopRedhat7 (including)7 (including)
Enterprise_linux_serverRedhat7 (including)7 (including)
Red Hat Enterprise Linux 6RedHatwpa_supplicant-1:0.7.3-9.el6_9.2*
Red Hat Enterprise Linux 7RedHatwpa_supplicant-1:2.6-5.el7_4.1*
WpaUbuntudevel*
WpaUbuntuesm-infra-legacy/trusty*
WpaUbuntuesm-infra/xenial*
WpaUbuntutrusty*
WpaUbuntutrusty/esm*
WpaUbuntuvivid/ubuntu-core*
WpaUbuntuxenial*
WpaUbuntuzesty*

Potential Mitigations

  • Use a well-vetted algorithm that is currently considered to be strong by experts in the field, and select well-tested implementations with adequate length seeds.
  • In general, if a pseudo-random number generator is not advertised as being cryptographically secure, then it is probably a statistical PRNG and should not be used in security-sensitive contexts.
  • Pseudo-random number generators can produce predictable numbers if the generator is known and the seed can be guessed. A 256-bit seed is a good starting point for producing a “random enough” number.

References