VYPR
High severity8.1NVD Advisory· Published Oct 17, 2017· Updated May 13, 2026

CVE-2017-13082

CVE-2017-13082

Description

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Affected products

86
  • W1.fi/Hostapd31 versions
    cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*+ 30 more
    • cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*+ 32 more
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*+ 2 more
    • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • FreeBSD/FreeBSD5 versions
    cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:10:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:10.4:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:11:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:11.1:*:*:*:*:*:*:*
  • OpenSUSE/Leap2 versions
    cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*+ 2 more
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
  • cpe:2.3:o:suse:openstack_cloud:6:*:*:*:*:*:*:*
  • Wi-Fi Alliance/Wi-Fi Protected Access (WPA and WPA2)v5
    Range: WPA

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

25

News mentions

0

No linked articles in our index yet.