6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
6.7 Medium
AI Score
Confidence
High
0.01 Low
EPSS
Percentile
83.3%
The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors’ products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.
arstechnica.com/articles/paedia/wpa-cracked.ars
dl.aircrack-ng.org/breakingwepandwpa.pdf
lists.immunitysec.com/pipermail/dailydave/2008-November/005413.html
radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html
trac.aircrack-ng.org/svn/trunk/src/tkiptun-ng.c
www.aircrack-ng.org/doku.php?id=tkiptun-ng
www.cisco.com/en/US/products/products_security_response09186a0080a30036.html
www.securityfocus.com/bid/32164