Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ubuntu_linux | Canonical | 14.04 (including) | 14.04 (including) |
Ubuntu_linux | Canonical | 16.04 (including) | 16.04 (including) |
Ubuntu_linux | Canonical | 17.04 (including) | 17.04 (including) |
Debian_linux | Debian | 8.0 (including) | 8.0 (including) |
Debian_linux | Debian | 9.0 (including) | 9.0 (including) |
Freebsd | Freebsd | * | * |
Freebsd | Freebsd | 10 (including) | 10 (including) |
Freebsd | Freebsd | 10.4 (including) | 10.4 (including) |
Freebsd | Freebsd | 11 (including) | 11 (including) |
Freebsd | Freebsd | 11.1 (including) | 11.1 (including) |
Leap | Opensuse | 42.2 (including) | 42.2 (including) |
Leap | Opensuse | 42.3 (including) | 42.3 (including) |
Enterprise_linux_desktop | Redhat | 7 (including) | 7 (including) |
Enterprise_linux_server | Redhat | 7 (including) | 7 (including) |
Wpa | Ubuntu | devel | * |
Wpa | Ubuntu | trusty | * |
Wpa | Ubuntu | vivid/ubuntu-core | * |
Wpa | Ubuntu | xenial | * |
Wpa | Ubuntu | zesty | * |