### [CVE-2017-13087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients. ### POC #### Reference - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt - http://www.kb.cert.org/vuls/id/228519 - http://www.ubuntu.com/usn/USN-3455-1 - https://cert.vde.com/en-us/advisories/vde-2017-005 - https://hackerone.com/reports/286740 - https://support.lenovo.com/us/en/product_security/LEN-17420 - https://www.krackattacks.com/ #### Github - https://github.com/andir/nixos-issue-db-example - https://github.com/chinatso/KRACK - https://github.com/giterlizzi/secdb-feeds - https://github.com/kristate/krackinfo - https://github.com/merlinepedra/KRACK