Loading HuntDB...

CVE-2017-13079

UNKNOWN
Published 2017-10-17T13:00:00
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2017-13079. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed MODERATE

GHSA-gh8r-7rf7-w4rg

Advisory Details

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

References

Advisory provided by GitHub Security Advisory Database. Published: May 13, 2022, Modified: April 20, 2025

References

HackerOne Reports

vanhoefm
Internet Bug Bounty
Reusing a Nonce, Key Pair in Encryption
Published: 2017-10-17T13:00:00
Last Modified: 2024-08-05T18:58:12.231Z
Copied to clipboard!