CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS
Percentile
74.4%
Severity: High
Date : 2017-10-16
CVE-ID : CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13082 CVE-2017-13087 CVE-2017-13088
Package : hostapd
Type : man-in-the-middle
Remote : Yes
Link : https://security.archlinux.org/AVG-448
The package hostapd before version 2.6-6 is vulnerable to man-in-the-
middle.
Upgrade to 2.6-6.
The problems have been fixed upstream but no release is available yet.
None.
A vulnerability has been discovered that allows reinstallation of the
pairwise encryption key (PTK-TK) in the 4-way handshake.
A vulnerability has been discovered that allows reinstallation of the
group key (GTK) in the 4-way handshake.
A vulnerability has been discovered that allows reinstallation of the
integrity group key (IGTK) in the 4-way handshake.
A vulnerability has been discovered that allows reinstallation of the
group key (GTK) in the group key handshake.
A vulnerability has been discovered that allows reinstallation of the
integrity group key (IGTK) in the group key handshake.
A vulnerability has been discovered that allows accepting a
retransmitted FT Reassociation Request and reinstalling the pairwise
key (PTK) while processing it.
A vulnerability has been discovered that allows reinstallation of the
group key (GTK) when processing a Wireless Network Management (WNM)
Sleep Mode Response frame.
A vulnerability has been discovered that allows reinstallation of the
integrity group key (IGTK) when processing a Wireless Network
Management (WNM) Sleep Mode Response frame.
A remote attacker within physical proximity to the target WiFi network
is able to decrypt all data that the victim transmits, inject arbitrary
packets to hijack TCP connection or replay unicast and group-addressed
frames.
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
https://papers.mathyvanhoef.com/ccs2017.pdf
https://www.kb.cert.org/vuls/id/228519
https://www.krackattacks.com/
https://w1.fi/cgit/hostap/commit/?id=53bb18cc8b7a4da72e47e4b3752d0d2135cffb23
https://w1.fi/cgit/hostap/commit/?id=0adc9b28b39d414d5febfff752f6a1576f785c85
https://w1.fi/cgit/hostap/commit/?id=cb5132bb35698cc0c743e34fe0e845dfc4c3e410
https://w1.fi/cgit/hostap/commit/?id=0e3bd7ac684a2289aa613347e2f3ad54ad6a9449
https://w1.fi/cgit/hostap/commit/?id=e760851176c77ae6de19821bb1d5bf3ae2cb5187
https://w1.fi/cgit/hostap/commit/?id=2a9c5217b18be9462a5329626e2f95cc7dd8d4f1
https://w1.fi/cgit/hostap/commit/?id=87e2db16bafcbc60b8d0016175814a73c1e8ed45
https://security.archlinux.org/CVE-2017-13077
https://security.archlinux.org/CVE-2017-13078
https://security.archlinux.org/CVE-2017-13079
https://security.archlinux.org/CVE-2017-13080
https://security.archlinux.org/CVE-2017-13081
https://security.archlinux.org/CVE-2017-13082
https://security.archlinux.org/CVE-2017-13087
https://security.archlinux.org/CVE-2017-13088
papers.mathyvanhoef.com/ccs2017.pdf
security.archlinux.org/AVG-448
security.archlinux.org/CVE-2017-13077
security.archlinux.org/CVE-2017-13078
security.archlinux.org/CVE-2017-13079
security.archlinux.org/CVE-2017-13080
security.archlinux.org/CVE-2017-13081
security.archlinux.org/CVE-2017-13082
security.archlinux.org/CVE-2017-13087
security.archlinux.org/CVE-2017-13088
w1.fi/cgit/hostap/commit/?id=0adc9b28b39d414d5febfff752f6a1576f785c85
w1.fi/cgit/hostap/commit/?id=0e3bd7ac684a2289aa613347e2f3ad54ad6a9449
w1.fi/cgit/hostap/commit/?id=2a9c5217b18be9462a5329626e2f95cc7dd8d4f1
w1.fi/cgit/hostap/commit/?id=53bb18cc8b7a4da72e47e4b3752d0d2135cffb23
w1.fi/cgit/hostap/commit/?id=87e2db16bafcbc60b8d0016175814a73c1e8ed45
w1.fi/cgit/hostap/commit/?id=cb5132bb35698cc0c743e34fe0e845dfc4c3e410
w1.fi/cgit/hostap/commit/?id=e760851176c77ae6de19821bb1d5bf3ae2cb5187
w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
www.kb.cert.org/vuls/id/228519
www.krackattacks.com/
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS
Percentile
74.4%