Loading HuntDB...

CVE-2017-13082

UNKNOWN
Published 2017-10-17T13:00:00
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2017-13082. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-fx3c-8pqx-5v4c

Advisory Details

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

References

Advisory provided by GitHub Security Advisory Database. Published: May 13, 2022, Modified: April 20, 2025

References

HackerOne Reports

vanhoefm
Internet Bug Bounty
Reusing a Nonce, Key Pair in Encryption
Published: 2017-10-17T13:00:00
Last Modified: 2024-08-05T18:58:12.560Z
Copied to clipboard!