VYPR
Medium severity5.3NVD Advisory· Published Oct 17, 2017· Updated May 13, 2026

CVE-2017-13080

CVE-2017-13080

Description

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

Affected products

86
  • W1.fi/Hostapd31 versions
    cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*+ 30 more
    • cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*+ 32 more
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*+ 2 more
    • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • FreeBSD/FreeBSD5 versions
    cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:10:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:10.4:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:11:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:11.1:*:*:*:*:*:*:*
  • OpenSUSE/Leap2 versions
    cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*+ 2 more
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
  • cpe:2.3:o:suse:openstack_cloud:6:*:*:*:*:*:*:*
  • Wi-Fi Alliance/Wi-Fi Protected Access (WPA and WPA2)v5
    Range: WPA

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

43

News mentions

0

No linked articles in our index yet.