Loading HuntDB...

CVE-2017-13078

UNKNOWN
Published 2017-10-17T13:00:00
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2017-13078. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed MODERATE

GHSA-5fh3-v3jw-rc9h

Advisory Details

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

References

Advisory provided by GitHub Security Advisory Database. Published: May 13, 2022, Modified: April 20, 2025

References

HackerOne Reports

vanhoefm
Internet Bug Bounty
Reusing a Nonce, Key Pair in Encryption
Published: 2017-10-17T13:00:00
Last Modified: 2024-08-05T18:58:12.469Z
Copied to clipboard!