You are here
Home > Preporuke > Ranjivosti u protokolima WPA i WPA2

Ranjivosti u protokolima WPA i WPA2

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II

Advisory ID: cisco-sa-20171016-wpa

Revision: 1.0

For Public Release: 2017 October 16 14:00 GMT

Last Updated: 2017 October 16 14:00 GMT

CVE ID(s): CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088

CVSS Score v(3): 4.3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

+———————————————————————

Summary
=======
On October 16th, 2017, a research paper with the title of “Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2” was made publicly available. This paper discusses seven vulnerabilities affecting session key negotiation in both the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key, or an integrity key on either a wireless client or a wireless access point. Additional research also led to the discovery of three additional vulnerabilities (not discussed in the original paper) affecting wireless supplicant supporting either the 802.11z (Extensions to Direct-Link Setup) standard or the 802.11v (Wireless Network Management) standard. The three additional vulnerabilities could also allow the reinstallation of a pairwise key, group key, or integrity group key.

Multiple Cisco wireless products are affected by these vulnerabilities.

Cisco will release software updates that address these vulnerabilities. There is a workaround that addresses the vulnerability in CVE-2017-13082. There are no workarounds that address the other vulnerabilities described in this advisory.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa”]

—–BEGIN PGP SIGNATURE—–
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=eFx1
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-10-0119-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa weechat

Otkriven je sigurnosni nedostatak u programskom paketu weechat za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close