Unknown
CVE-2017-13088
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2017-13088
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- canonical,
- debian,
- freebsd,
- opensuse,
- redhat,
- suse,
- w1.fi
Products
- debian linux 8.0,
- debian linux 9.0,
- enterprise linux desktop 7,
- enterprise linux server 7,
- freebsd,
- freebsd 10,
- freebsd 10.4,
- freebsd 11,
- freebsd 11.1,
- hostapd 0.2.4,
- hostapd 0.2.5,
- hostapd 0.2.6,
- hostapd 0.2.8,
- hostapd 0.3.10,
- hostapd 0.3.11,
- hostapd 0.3.7,
- hostapd 0.3.9,
- hostapd 0.4.10,
- hostapd 0.4.11,
- hostapd 0.4.7,
- hostapd 0.4.8,
- hostapd 0.4.9,
- hostapd 0.5.10,
- hostapd 0.5.11,
- hostapd 0.5.7,
- hostapd 0.5.8,
- hostapd 0.5.9,
- hostapd 0.6.10,
- hostapd 0.6.8,
- hostapd 0.6.9,
- hostapd 0.7.3,
- hostapd 1.0,
- hostapd 1.1,
- hostapd 2.0,
- hostapd 2.1,
- hostapd 2.2,
- hostapd 2.3,
- hostapd 2.4,
- hostapd 2.5,
- hostapd 2.6,
- leap 42.2,
- leap 42.3,
- linux enterprise desktop 12,
- linux enterprise point of sale 11,
- linux enterprise server 11,
- linux enterprise server 12,
- openstack cloud 6,
- ubuntu linux 14.04,
- ubuntu linux 16.04,
- ubuntu linux 17.04,
- wpa supplicant 0.2.4,
- wpa supplicant 0.2.5,
- wpa supplicant 0.2.6,
- wpa supplicant 0.2.7,
- wpa supplicant 0.2.8,
- wpa supplicant 0.3.10,
- wpa supplicant 0.3.11,
- wpa supplicant 0.3.7,
- wpa supplicant 0.3.8,
- wpa supplicant 0.3.9,
- wpa supplicant 0.4.10,
- wpa supplicant 0.4.11,
- wpa supplicant 0.4.7,
- wpa supplicant 0.4.8,
- wpa supplicant 0.4.9,
- wpa supplicant 0.5.10,
- wpa supplicant 0.5.11,
- wpa supplicant 0.5.7,
- wpa supplicant 0.5.8,
- wpa supplicant 0.5.9,
- wpa supplicant 0.6.10,
- wpa supplicant 0.6.8,
- wpa supplicant 0.6.9,
- wpa supplicant 0.7.3,
- wpa supplicant 1.0,
- wpa supplicant 1.1,
- wpa supplicant 2.0,
- wpa supplicant 2.1,
- wpa supplicant 2.2,
- wpa supplicant 2.3,
- wpa supplicant 2.4,
- wpa supplicant 2.5,
- wpa supplicant 2.6
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: