diff --git a/2017/13xxx/CVE-2017-13077.json b/2017/13xxx/CVE-2017-13077.json index 1768867fd29..cad1c7c8608 100644 --- a/2017/13xxx/CVE-2017-13077.json +++ b/2017/13xxx/CVE-2017-13077.json @@ -1,32 +1,51 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-13077", - "ASSIGNER": "cert@cert.org", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Wi-Fi Alliance", - "product": { - "product_data": [ - { - "product_name": "Wi-Fi Protected Access (WPA and WPA2)", - "version": { - "version_data": [ - { - "version_value": "WPA" - }, - { - "version_value": "WPA2" - } + "CVE_data_meta" : { + "ASSIGNER" : "cert@cert.org", + "ID" : "CVE-2017-13077", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } ] - } - } + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the pairwise key in the four-way handshake." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } ] } ] @@ -61,26 +80,5 @@ "url" : "http://www.securitytracker.com/id/1039585" } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-323: Reusing a Nonce, Key Pair in Encryption" - } - ] - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames" - } - ] - } -} \ No newline at end of file + } +} diff --git a/2017/13xxx/CVE-2017-13078.json b/2017/13xxx/CVE-2017-13078.json index 7c3969181d8..a43db7464b6 100644 --- a/2017/13xxx/CVE-2017-13078.json +++ b/2017/13xxx/CVE-2017-13078.json @@ -1,66 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-13078", - "ASSIGNER": "cert@cert.org", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Wi-Fi Alliance", - "product": { - "product_data": [ - { - "product_name": "Wi-Fi Protected Access (WPA and WPA2)", - "version": { - "version_data": [ - { - "version_value": "WPA" - }, - { - "version_value": "WPA2" - } + "CVE_data_meta" : { + "ASSIGNER" : "cert@cert.org", + "ID" : "CVE-2017-13078", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Wi-Fi Protected Access (WPA and WPA2)", + "version" : { + "version_data" : [ + { + "version_value" : "WPA" + }, + { + "version_value" : "WPA2" + } + ] + } + } ] - } - } - ] - } - } + }, + "vendor_name" : "Wi-Fi Alliance" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients." + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-323: Reusing a Nonce, Key Pair in Encryption" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.krackattacks.com/" - }, - { - "url": "http://www.kb.cert.org/vuls/id/228519" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients" - } - ] - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-323: Reusing a Nonce, Key Pair in Encryption" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.krackattacks.com/" + }, + { + "url" : "http://www.kb.cert.org/vuls/id/228519" + } + ] + } } diff --git a/2017/13xxx/CVE-2017-13079.json b/2017/13xxx/CVE-2017-13079.json index 6fb8debc63d..7b16010e03f 100644 --- a/2017/13xxx/CVE-2017-13079.json +++ b/2017/13xxx/CVE-2017-13079.json @@ -1,66 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-13079", - "ASSIGNER": "cert@cert.org", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Wi-Fi Alliance", - "product": { - "product_data": [ - { - "product_name": "Wi-Fi Protected Access (WPA and WPA2)", - "version": { - "version_data": [ - { - "version_value": "WPA" - }, - { - "version_value": "WPA2" - } + "CVE_data_meta" : { + "ASSIGNER" : "cert@cert.org", + "ID" : "CVE-2017-13079", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Wi-Fi Protected Access (WPA and WPA2)", + "version" : { + "version_data" : [ + { + "version_value" : "WPA" + }, + { + "version_value" : "WPA2" + } + ] + } + } ] - } - } - ] - } - } + }, + "vendor_name" : "Wi-Fi Alliance" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients." + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-323: Reusing a Nonce, Key Pair in Encryption" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.krackattacks.com/" - }, - { - "url": "http://www.kb.cert.org/vuls/id/228519" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients" - } - ] - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-323: Reusing a Nonce, Key Pair in Encryption" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.krackattacks.com/" + }, + { + "url" : "http://www.kb.cert.org/vuls/id/228519" + } + ] + } } diff --git a/2017/13xxx/CVE-2017-13080.json b/2017/13xxx/CVE-2017-13080.json index 9304e531edc..598b3826ed5 100644 --- a/2017/13xxx/CVE-2017-13080.json +++ b/2017/13xxx/CVE-2017-13080.json @@ -1,66 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-13080", - "ASSIGNER": "cert@cert.org", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Wi-Fi Alliance", - "product": { - "product_data": [ - { - "product_name": "Wi-Fi Protected Access (WPA and WPA2)", - "version": { - "version_data": [ - { - "version_value": "WPA" - }, - { - "version_value": "WPA2" - } + "CVE_data_meta" : { + "ASSIGNER" : "cert@cert.org", + "ID" : "CVE-2017-13080", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Wi-Fi Protected Access (WPA and WPA2)", + "version" : { + "version_data" : [ + { + "version_value" : "WPA" + }, + { + "version_value" : "WPA2" + } + ] + } + } ] - } - } - ] - } - } + }, + "vendor_name" : "Wi-Fi Alliance" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients." + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-323: Reusing a Nonce, Key Pair in Encryption" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.krackattacks.com/" - }, - { - "url": "http://www.kb.cert.org/vuls/id/228519" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients" - } - ] - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-323: Reusing a Nonce, Key Pair in Encryption" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.krackattacks.com/" + }, + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080" + }, + { + "url" : "http://www.kb.cert.org/vuls/id/228519" + } + ] + } } diff --git a/2017/13xxx/CVE-2017-13081.json b/2017/13xxx/CVE-2017-13081.json index 0973b5406bf..91db77e111b 100644 --- a/2017/13xxx/CVE-2017-13081.json +++ b/2017/13xxx/CVE-2017-13081.json @@ -1,66 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-13081", - "ASSIGNER": "cert@cert.org", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Wi-Fi Alliance", - "product": { - "product_data": [ - { - "product_name": "Wi-Fi Protected Access (WPA and WPA2)", - "version": { - "version_data": [ - { - "version_value": "WPA" - }, - { - "version_value": "WPA2" - } + "CVE_data_meta" : { + "ASSIGNER" : "cert@cert.org", + "ID" : "CVE-2017-13081", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Wi-Fi Protected Access (WPA and WPA2)", + "version" : { + "version_data" : [ + { + "version_value" : "WPA" + }, + { + "version_value" : "WPA2" + } + ] + } + } ] - } - } - ] - } - } + }, + "vendor_name" : "Wi-Fi Alliance" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients." + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-323: Reusing a Nonce, Key Pair in Encryption" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.krackattacks.com/" - }, - { - "url": "http://www.kb.cert.org/vuls/id/228519" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients" - } - ] - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-323: Reusing a Nonce, Key Pair in Encryption" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.krackattacks.com/" + }, + { + "url" : "http://www.kb.cert.org/vuls/id/228519" + } + ] + } } diff --git a/2017/13xxx/CVE-2017-13082.json b/2017/13xxx/CVE-2017-13082.json index b7b80a46f27..49f2e881f22 100644 --- a/2017/13xxx/CVE-2017-13082.json +++ b/2017/13xxx/CVE-2017-13082.json @@ -1,66 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-13082", - "ASSIGNER": "cert@cert.org", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Wi-Fi Alliance", - "product": { - "product_data": [ - { - "product_name": "Wi-Fi Protected Access (WPA and WPA2)", - "version": { - "version_data": [ - { - "version_value": "WPA" - }, - { - "version_value": "WPA2" - } + "CVE_data_meta" : { + "ASSIGNER" : "cert@cert.org", + "ID" : "CVE-2017-13082", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Wi-Fi Protected Access (WPA and WPA2)", + "version" : { + "version_data" : [ + { + "version_value" : "WPA" + }, + { + "version_value" : "WPA2" + } + ] + } + } ] - } - } - ] - } - } + }, + "vendor_name" : "Wi-Fi Alliance" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames." + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-323: Reusing a Nonce, Key Pair in Encryption" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.krackattacks.com/" - }, - { - "url": "http://www.kb.cert.org/vuls/id/228519" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames" - } - ] - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-323: Reusing a Nonce, Key Pair in Encryption" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.krackattacks.com/" + }, + { + "url" : "http://www.kb.cert.org/vuls/id/228519" + } + ] + } } diff --git a/2017/13xxx/CVE-2017-13084.json b/2017/13xxx/CVE-2017-13084.json index 709e2340667..ea3a677f556 100644 --- a/2017/13xxx/CVE-2017-13084.json +++ b/2017/13xxx/CVE-2017-13084.json @@ -1,66 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-13084", - "ASSIGNER": "cert@cert.org", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Wi-Fi Alliance", - "product": { - "product_data": [ - { - "product_name": "Wi-Fi Protected Access (WPA and WPA2)", - "version": { - "version_data": [ - { - "version_value": "WPA" - }, - { - "version_value": "WPA2" - } + "CVE_data_meta" : { + "ASSIGNER" : "cert@cert.org", + "ID" : "CVE-2017-13084", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Wi-Fi Protected Access (WPA and WPA2)", + "version" : { + "version_data" : [ + { + "version_value" : "WPA" + }, + { + "version_value" : "WPA2" + } + ] + } + } ] - } - } - ] - } - } + }, + "vendor_name" : "Wi-Fi Alliance" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames." + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-323: Reusing a Nonce, Key Pair in Encryption" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.krackattacks.com/" - }, - { - "url": "http://www.kb.cert.org/vuls/id/228519" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames" - } - ] - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-323: Reusing a Nonce, Key Pair in Encryption" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.krackattacks.com/" + }, + { + "url" : "http://www.kb.cert.org/vuls/id/228519" + } + ] + } } diff --git a/2017/13xxx/CVE-2017-13086.json b/2017/13xxx/CVE-2017-13086.json index c39ca31eef0..c651c2c83b5 100644 --- a/2017/13xxx/CVE-2017-13086.json +++ b/2017/13xxx/CVE-2017-13086.json @@ -1,66 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-13086", - "ASSIGNER": "cert@cert.org", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Wi-Fi Alliance", - "product": { - "product_data": [ - { - "product_name": "Wi-Fi Protected Access (WPA and WPA2)", - "version": { - "version_data": [ - { - "version_value": "WPA" - }, - { - "version_value": "WPA2" - } + "CVE_data_meta" : { + "ASSIGNER" : "cert@cert.org", + "ID" : "CVE-2017-13086", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Wi-Fi Protected Access (WPA and WPA2)", + "version" : { + "version_data" : [ + { + "version_value" : "WPA" + }, + { + "version_value" : "WPA2" + } + ] + } + } ] - } - } - ] - } - } + }, + "vendor_name" : "Wi-Fi Alliance" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames." + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-323: Reusing a Nonce, Key Pair in Encryption" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.krackattacks.com/" - }, - { - "url": "http://www.kb.cert.org/vuls/id/228519" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames" - } - ] - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-323: Reusing a Nonce, Key Pair in Encryption" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.krackattacks.com/" + }, + { + "url" : "http://www.kb.cert.org/vuls/id/228519" + } + ] + } } diff --git a/2017/13xxx/CVE-2017-13087.json b/2017/13xxx/CVE-2017-13087.json index c1131cb19a2..e8ca124dc80 100644 --- a/2017/13xxx/CVE-2017-13087.json +++ b/2017/13xxx/CVE-2017-13087.json @@ -1,66 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-13087", - "ASSIGNER": "cert@cert.org", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Wi-Fi Alliance", - "product": { - "product_data": [ - { - "product_name": "Wi-Fi Protected Access (WPA and WPA2)", - "version": { - "version_data": [ - { - "version_value": "WPA" - }, - { - "version_value": "WPA2" - } + "CVE_data_meta" : { + "ASSIGNER" : "cert@cert.org", + "ID" : "CVE-2017-13087", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Wi-Fi Protected Access (WPA and WPA2)", + "version" : { + "version_data" : [ + { + "version_value" : "WPA" + }, + { + "version_value" : "WPA2" + } + ] + } + } ] - } - } - ] - } - } + }, + "vendor_name" : "Wi-Fi Alliance" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients." + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-323: Reusing a Nonce, Key Pair in Encryption" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.krackattacks.com/" - }, - { - "url": "http://www.kb.cert.org/vuls/id/228519" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients" - } - ] - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-323: Reusing a Nonce, Key Pair in Encryption" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.krackattacks.com/" + }, + { + "url" : "http://www.kb.cert.org/vuls/id/228519" + } + ] + } } diff --git a/2017/13xxx/CVE-2017-13088.json b/2017/13xxx/CVE-2017-13088.json index 114798390f8..2f60542f6b4 100644 --- a/2017/13xxx/CVE-2017-13088.json +++ b/2017/13xxx/CVE-2017-13088.json @@ -1,66 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-13088", - "ASSIGNER": "cert@cert.org", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Wi-Fi Alliance", - "product": { - "product_data": [ - { - "product_name": "Wi-Fi Protected Access (WPA and WPA2)", - "version": { - "version_data": [ - { - "version_value": "WPA" - }, - { - "version_value": "WPA2" - } + "CVE_data_meta" : { + "ASSIGNER" : "cert@cert.org", + "ID" : "CVE-2017-13088", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Wi-Fi Protected Access (WPA and WPA2)", + "version" : { + "version_data" : [ + { + "version_value" : "WPA" + }, + { + "version_value" : "WPA2" + } + ] + } + } ] - } - } - ] - } - } + }, + "vendor_name" : "Wi-Fi Alliance" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients." + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-323: Reusing a Nonce, Key Pair in Encryption" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.krackattacks.com/" - }, - { - "url": "http://www.kb.cert.org/vuls/id/228519" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients" - } - ] - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-323: Reusing a Nonce, Key Pair in Encryption" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.krackattacks.com/" + }, + { + "url" : "http://www.kb.cert.org/vuls/id/228519" + } + ] + } }