CVE Vulnerabilities

CVE-2017-13082

Reusing a Nonce, Key Pair in Encryption

Published: Oct 17, 2017 | Modified: Nov 21, 2024
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
5.8 MEDIUM
AV:A/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.1 IMPORTANT
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
HIGH

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Weakness

Nonces should be used for the present occasion and only once.

Affected Software

Name Vendor Start Version End Version
Ubuntu_linux Canonical 14.04 (including) 14.04 (including)
Ubuntu_linux Canonical 16.04 (including) 16.04 (including)
Ubuntu_linux Canonical 17.04 (including) 17.04 (including)
Debian_linux Debian 8.0 (including) 8.0 (including)
Debian_linux Debian 9.0 (including) 9.0 (including)
Freebsd Freebsd * *
Freebsd Freebsd 10 (including) 10 (including)
Freebsd Freebsd 10.4 (including) 10.4 (including)
Freebsd Freebsd 11 (including) 11 (including)
Freebsd Freebsd 11.1 (including) 11.1 (including)
Leap Opensuse 42.2 (including) 42.2 (including)
Leap Opensuse 42.3 (including) 42.3 (including)
Enterprise_linux_desktop Redhat 7 (including) 7 (including)
Enterprise_linux_server Redhat 7 (including) 7 (including)
Red Hat Enterprise Linux 7 RedHat wpa_supplicant-1:2.6-5.el7_4.1 *
Wpa Ubuntu devel *
Wpa Ubuntu trusty *
Wpa Ubuntu vivid/ubuntu-core *
Wpa Ubuntu xenial *
Wpa Ubuntu zesty *

Potential Mitigations

References