vulnerability
FreeBSD: VID-1f8de723-dab3-11e7-b5af-a4badb2f4699 (CVE-2017-1307): FreeBSD -- WPA2 protocol vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:N/C:C/I:C/A:N) | Dec 6, 2017 | Dec 6, 2017 | Dec 10, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:N)
Published
Dec 6, 2017
Added
Dec 6, 2017
Modified
Dec 10, 2025
Description
Problem Description: A vulnerability was found in how a number of implementations can be triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by replaying a specific frame that is used to manage the keys. Impact: Such reinstallation of the encryption key can result in two different types of vulnerabilities: disabling replay protection and significantly reducing the security of encryption to the point of allowing frames to be decrypted or some parts of the keys to be determined by an attacker depending on which cipher is used.
Solutions
freebsd-upgrade-base-11_1-release-p2freebsd-upgrade-base-11_0-release-p13freebsd-upgrade-base-10_4-release-p1freebsd-upgrade-base-10_3-release-p22
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.