vulnerability

Oracle Linux: CVE-2017-13082: ELSA-2017-2907: wpa_supplicant security update (IMPORTANT)

Severity
6
CVSS
(AV:A/AC:L/Au:N/C:P/I:P/A:P)
Published
Oct 16, 2017
Added
Oct 18, 2017
Modified
Dec 3, 2025

Description

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit this attack to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by reinstalling a previously used pairwise key (PTK-TK) by retransmitting Fast BSS Transition (FT) Reassociation Requests.

Solution

oracle-linux-upgrade-wpa-supplicant
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.