mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
32 lines
1.5 KiB
Markdown
32 lines
1.5 KiB
Markdown
### [CVE-2017-13082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082)
|
|
&color=blue)
|
|

|
|

|
|
|
|
### Description
|
|
|
|
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
|
|
- http://www.kb.cert.org/vuls/id/228519
|
|
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
|
|
- http://www.ubuntu.com/usn/USN-3455-1
|
|
- https://cert.vde.com/en-us/advisories/vde-2017-005
|
|
- https://hackerone.com/reports/286740
|
|
- https://support.lenovo.com/us/en/product_security/LEN-17420
|
|
- https://www.krackattacks.com/
|
|
|
|
#### Github
|
|
- https://github.com/Wellisson121/krackattacks
|
|
- https://github.com/andir/nixos-issue-db-example
|
|
- https://github.com/chinatso/KRACK
|
|
- https://github.com/giterlizzi/secdb-feeds
|
|
- https://github.com/kristate/krackinfo
|
|
- https://github.com/lenmorld/SOEN321_Krack
|
|
- https://github.com/merlinepedra/KRACK
|
|
- https://github.com/ptdropper/krackattacks-test-ap-ft
|
|
|