cve/2017/CVE-2017-13087.md
2024-06-18 02:51:15 +02:00

28 lines
1.2 KiB
Markdown

### [CVE-2017-13087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
### POC
#### Reference
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- http://www.kb.cert.org/vuls/id/228519
- http://www.ubuntu.com/usn/USN-3455-1
- https://cert.vde.com/en-us/advisories/vde-2017-005
- https://hackerone.com/reports/286740
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://www.krackattacks.com/
#### Github
- https://github.com/andir/nixos-issue-db-example
- https://github.com/chinatso/KRACK
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/kristate/krackinfo
- https://github.com/merlinepedra/KRACK