CVE Vulnerabilities

CVE-2017-13079

Reusing a Nonce, Key Pair in Encryption

Published: Oct 17, 2017 | Modified: Nov 21, 2024
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
2.9 LOW
AV:A/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
8.1 IMPORTANT
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
HIGH

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

Weakness

Nonces should be used for the present occasion and only once.

Affected Software

Name Vendor Start Version End Version
Ubuntu_linux Canonical 14.04 (including) 14.04 (including)
Ubuntu_linux Canonical 16.04 (including) 16.04 (including)
Ubuntu_linux Canonical 17.04 (including) 17.04 (including)
Debian_linux Debian 8.0 (including) 8.0 (including)
Debian_linux Debian 9.0 (including) 9.0 (including)
Freebsd Freebsd * *
Freebsd Freebsd 10 (including) 10 (including)
Freebsd Freebsd 10.4 (including) 10.4 (including)
Freebsd Freebsd 11 (including) 11 (including)
Freebsd Freebsd 11.1 (including) 11.1 (including)
Leap Opensuse 42.2 (including) 42.2 (including)
Leap Opensuse 42.3 (including) 42.3 (including)
Enterprise_linux_desktop Redhat 7 (including) 7 (including)
Enterprise_linux_server Redhat 7 (including) 7 (including)
Wpa Ubuntu devel *
Wpa Ubuntu trusty *
Wpa Ubuntu vivid/ubuntu-core *
Wpa Ubuntu xenial *
Wpa Ubuntu zesty *

Potential Mitigations

References