VYPR
Medium severity6.8NVD Advisory· Published Oct 17, 2017· Updated May 13, 2026

CVE-2017-13086

CVE-2017-13086

Description

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Affected products

86
  • W1.fi/Hostapd31 versions
    cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*+ 30 more
    • cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.5.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*+ 32 more
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.11:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.5.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.8:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.6.9:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*+ 2 more
    • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • FreeBSD/FreeBSD5 versions
    cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:10:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:10.4:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:11:*:*:*:*:*:*:*
    • cpe:2.3:o:freebsd:freebsd:11.1:*:*:*:*:*:*:*
  • OpenSUSE/Leap2 versions
    cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*+ 2 more
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
  • cpe:2.3:o:suse:openstack_cloud:6:*:*:*:*:*:*:*
  • Wi-Fi Alliance/Wi-Fi Protected Access (WPA and WPA2)v5
    Range: WPA

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

21

News mentions

0

No linked articles in our index yet.