vulnerability
Oracle Linux: CVE-2017-13088: ELSA-2017-2907: wpa_supplicant security update (IMPORTANT)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:A/AC:L/Au:N/C:C/I:C/A:N) | Oct 16, 2017 | Oct 18, 2017 | Nov 29, 2024 |
Severity
8
CVSS
(AV:A/AC:L/Au:N/C:C/I:C/A:N)
Published
Oct 16, 2017
Added
Oct 18, 2017
Modified
Nov 29, 2024
Description
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit this attack to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by reinstalling a previously used integrity group key (IGTK) during a Wireless Network Management (WNM) Sleep Mode handshake.
A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit this attack to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by reinstalling a previously used integrity group key (IGTK) during a Wireless Network Management (WNM) Sleep Mode handshake.
Solution
oracle-linux-upgrade-wpa-supplicant

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.