VYPR
Medium severity5.3NVD Advisory· Published Oct 17, 2017· Updated May 13, 2026

CVE-2017-13081

CVE-2017-13081

Description

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

Affected products

86
  • W1.fi/Hostapd31 versions
    cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*+ 30 more
    • cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*+ 32 more
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*+ 2 more
    • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • FreeBSD/FreeBSD5 versions
    cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:10:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:10.4:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:11:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:11.1:*:*:*:*:*:*:*
  • OpenSUSE/Leap2 versions
    cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*+ 2 more
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
  • cpe:2.3:o:suse:openstack_cloud:6:*:*:*:*:*:*:*
  • Wi-Fi Alliance/Wi-Fi Protected Access (WPA and WPA2)v5
    Range: WPA

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

26

News mentions

0

No linked articles in our index yet.