Medium severity5.3NVD Advisory· Published Oct 17, 2017· Updated May 13, 2026
CVE-2017-13081
CVE-2017-13081
Description
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Affected products
86cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*+ 30 more
- cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.6:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*+ 32 more
- cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.6:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*+ 2 more
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
- cpe:2.3:o:suse:openstack_cloud:6:*:*:*:*:*:*:*
- Wi-Fi Alliance/Wi-Fi Protected Access (WPA and WPA2)v5Range: WPA
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
26- lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.htmlnvdThird Party Advisory
- www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txtnvdThird Party Advisory
- www.debian.org/security/2017/dsa-3999nvdThird Party Advisory
- www.kb.cert.org/vuls/id/228519nvdThird Party AdvisoryUS Government Resource
- www.securityfocus.com/bid/101274nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039573nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039576nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039577nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039578nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039581nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039585nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-3455-1nvdThird Party Advisory
- access.redhat.com/security/vulnerabilities/kracksnvdThird Party Advisory
- security.freebsd.org/advisories/FreeBSD-SA-17:07.wpa.ascnvdThird Party Advisory
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpanvdThird Party Advisory
- w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txtnvdThird Party Advisory
- www.krackattacks.comnvdTechnical DescriptionThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlnvd
- cert-portal.siemens.com/productcert/pdf/ssa-901333.pdfnvd
- cert.vde.com/en-us/advisories/vde-2017-005nvd
- lists.debian.org/debian-lts-announce/2018/11/msg00015.htmlnvd
- security.gentoo.org/glsa/201711-03nvd
- source.android.com/security/bulletin/2017-11-01nvd
- support.hpe.com/hpsc/doc/public/displaynvd
News mentions
0No linked articles in our index yet.