CVE Vulnerabilities

CVE-2017-13084

Reusing a Nonce, Key Pair in Encryption

Published: Oct 17, 2017 | Modified: Nov 21, 2024
CVSS 3.x
6.8
MEDIUM
Source:
NVD
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
5.4 MEDIUM
AV:A/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.1 LOW
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
HIGH

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Weakness

Nonces should be used for the present occasion and only once.

Affected Software

Name Vendor Start Version End Version
Ubuntu_linux Canonical 14.04 (including) 14.04 (including)
Ubuntu_linux Canonical 16.04 (including) 16.04 (including)
Ubuntu_linux Canonical 17.04 (including) 17.04 (including)
Debian_linux Debian 8.0 (including) 8.0 (including)
Debian_linux Debian 9.0 (including) 9.0 (including)
Freebsd Freebsd * *
Freebsd Freebsd 10 (including) 10 (including)
Freebsd Freebsd 10.4 (including) 10.4 (including)
Freebsd Freebsd 11 (including) 11 (including)
Freebsd Freebsd 11.1 (including) 11.1 (including)
Leap Opensuse 42.2 (including) 42.2 (including)
Leap Opensuse 42.3 (including) 42.3 (including)
Enterprise_linux_desktop Redhat 7 (including) 7 (including)
Enterprise_linux_server Redhat 7 (including) 7 (including)

Potential Mitigations

References