ID

VAR-201710-0213


CVE

CVE-2017-13084


TITLE

Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse

Trust: 0.8

sources: CERT/CC: VU#228519

DESCRIPTION

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or "KRACK" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). The WPA2 wireless network has a group key reload vulnerability in the PeerKey handshake. WPA2 is prone to multiple security weaknesses. Exploiting these issues may allow an unauthorized user to intercept and manipulate data or disclose sensitive information. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] wpa_supplicant (SSA:2017-291-02) New wpa_supplicant packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz: Upgraded. This update includes patches to mitigate the WPA2 protocol issues known as "KRACK" (Key Reinstallation AttaCK), which may be used to decrypt data, hijack TCP connections, and to forge and inject packets. This is the list of vulnerabilities that are addressed here: CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the 4-way handshake. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake. CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake. For more information, see: https://www.krackattacks.com/ https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz MD5 signatures: +-------------+ Slackware 14.0 package: d8ecfaadb50b3547967ab53733ffc019 wpa_supplicant-2.6-i486-1_slack14.0.txz Slackware x86_64 14.0 package: f25216d28800504ce498705da7c9a825 wpa_supplicant-2.6-x86_64-1_slack14.0.txz Slackware 14.1 package: 15c61050e4bab2581757befd86be74c0 wpa_supplicant-2.6-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 49fd537a520338744f7757615556d352 wpa_supplicant-2.6-x86_64-1_slack14.1.txz Slackware 14.2 package: c5539f40c8510af89be92945f0f80185 wpa_supplicant-2.6-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 4c527ff84fcdfd7839f217bbce2e4ae4 wpa_supplicant-2.6-x86_64-1_slack14.2.txz Slackware -current package: 28bd88a54e96368f7a7020c1f5fb67fe n/wpa_supplicant-2.6-i586-2.txz Slackware x86_64 -current package: 464fc6b48d1ac077f47e9a3a8534c160 n/wpa_supplicant-2.6-x86_64-2.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iEYEARECAAYFAlnnrOgACgkQakRjwEAQIjPgvQCfRcXlhuFjrDNPbEUeZrYLxnkW b+4An0l5cZOdtohI7Fq0NbryWajCOnM2 =5HQM -----END PGP SIGNATURE-----

Trust: 3.51

sources: NVD: CVE-2017-13084 // CERT/CC: VU#228519 // JVNDB: JVNDB-2017-009176 // CNVD: CNVD-2017-30400 // BID: 101274 // IVD: 37a5aa3e-4512-466b-9bc5-af5013c143e3 // VULMON: CVE-2017-13084 // PACKETSTORM: 144663

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 37a5aa3e-4512-466b-9bc5-af5013c143e3 // CNVD: CNVD-2017-30400

AFFECTED PRODUCTS

vendor:w1 fimodel:hostapdscope:eqversion:0.3.7

Trust: 1.6

vendor:w1 fimodel:hostapdscope:eqversion:0.3.11

Trust: 1.6

vendor:w1 fimodel:hostapdscope:eqversion:0.4.7

Trust: 1.6

vendor:w1 fimodel:hostapdscope:eqversion:0.2.8

Trust: 1.6

vendor:w1 fimodel:hostapdscope:eqversion:0.4.8

Trust: 1.6

vendor:w1 fimodel:hostapdscope:eqversion:0.2.4

Trust: 1.6

vendor:w1 fimodel:hostapdscope:eqversion:0.3.10

Trust: 1.6

vendor:w1 fimodel:hostapdscope:eqversion:0.2.5

Trust: 1.6

vendor:w1 fimodel:hostapdscope:eqversion:0.3.9

Trust: 1.6

vendor:w1 fimodel:hostapdscope:eqversion:0.2.6

Trust: 1.6

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 1.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 1.3

vendor:w1 fimodel:wpa supplicantscope:eqversion:2.6

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:2.2

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:1.0

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:2.2

Trust: 1.0

vendor:freebsdmodel:freebsdscope:eqversion:*

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.4.7

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.5.10

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:2.0

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:2.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.4.9

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.5.8

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.5.8

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:2.1

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.5.7

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.6.9

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.2.8

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:1.1

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.7.3

Trust: 1.0

vendor:freebsdmodel:freebsdscope:eqversion:10

Trust: 1.0

vendor:freebsdmodel:freebsdscope:eqversion:11.1

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.5.9

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.4.11

Trust: 1.0

vendor:freebsdmodel:freebsdscope:eqversion:10.4

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.2.6

Trust: 1.0

vendor:freebsdmodel:freebsdscope:eqversion:11

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.5.11

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:2.4

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.3.8

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.2.5

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.3.7

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.4.10

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.6.10

Trust: 1.0

vendor:susemodel:openstack cloudscope:eqversion:6

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:1.0

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.3.11

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:2.5

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.5.10

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:2.6

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.4.9

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:2.1

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:2.3

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:42.2

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:2.3

Trust: 1.0

vendor:susemodel:linux enterprise point of salescope:eqversion:11

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:1.1

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.5.7

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.7.3

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.6.9

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.5.9

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.4.8

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.2.7

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.2.4

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.3.10

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:42.3

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.4.11

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.6.8

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:17.04

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.6.8

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.4.10

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:0.5.11

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.6.10

Trust: 1.0

vendor:w1 fimodel:hostapdscope:eqversion:2.4

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:0.3.9

Trust: 1.0

vendor:w1 fimodel:wpa supplicantscope:eqversion:2.5

Trust: 1.0

vendor:9frontmodel: - scope: - version: -

Trust: 0.8

vendor:adtranmodel: - scope: - version: -

Trust: 0.8

vendor:avmmodel: - scope: - version: -

Trust: 0.8

vendor:actiontecmodel: - scope: - version: -

Trust: 0.8

vendor:aerohivemodel: - scope: - version: -

Trust: 0.8

vendor:alcatel lucentmodel: - scope: - version: -

Trust: 0.8

vendor:android open sourcemodel: - scope: - version: -

Trust: 0.8

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:arch linuxmodel: - scope: - version: -

Trust: 0.8

vendor:arubamodel: - scope: - version: -

Trust: 0.8

vendor:asustek computermodel: - scope: - version: -

Trust: 0.8

vendor:barracudamodel: - scope: - version: -

Trust: 0.8

vendor:broadcommodel: - scope: - version: -

Trust: 0.8

vendor:cambiummodel: - scope: - version: -

Trust: 0.8

vendor:centosmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:cradlepointmodel: - scope: - version: -

Trust: 0.8

vendor:cypress semiconductormodel: - scope: - version: -

Trust: 0.8

vendor:d linkmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:dellmodel: - scope: - version: -

Trust: 0.8

vendor:digimodel: - scope: - version: -

Trust: 0.8

vendor:draytekmodel: - scope: - version: -

Trust: 0.8

vendor:edimax computermodel: - scope: - version: -

Trust: 0.8

vendor:engeniusmodel: - scope: - version: -

Trust: 0.8

vendor:endianmodel: - scope: - version: -

Trust: 0.8

vendor:espressifmodel: - scope: - version: -

Trust: 0.8

vendor:extrememodel: - scope: - version: -

Trust: 0.8

vendor:f securemodel: - scope: - version: -

Trust: 0.8

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:googlemodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:hostapmodel: - scope: - version: -

Trust: 0.8

vendor:ipfiremodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:lancommodel: - scope: - version: -

Trust: 0.8

vendor:ledemodel: - scope: - version: -

Trust: 0.8

vendor:lifxmodel: - scope: - version: -

Trust: 0.8

vendor:lenovomodel: - scope: - version: -

Trust: 0.8

vendor:microchipmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:mojomodel: - scope: - version: -

Trust: 0.8

vendor:nestmodel: - scope: - version: -

Trust: 0.8

vendor:netbsdmodel: - scope: - version: -

Trust: 0.8

vendor:netgearmodel: - scope: - version: -

Trust: 0.8

vendor:opnsensemodel: - scope: - version: -

Trust: 0.8

vendor:omnirommodel: - scope: - version: -

Trust: 0.8

vendor:open meshmodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel: - scope: - version: -

Trust: 0.8

vendor:peplinkmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:riverbedmodel: - scope: - version: -

Trust: 0.8

vendor:rockwell automationmodel: - scope: - version: -

Trust: 0.8

vendor:ruckusmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:samsung mobilemodel: - scope: - version: -

Trust: 0.8

vendor:sierramodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sonosmodel: - scope: - version: -

Trust: 0.8

vendor:sonymodel: - scope: - version: -

Trust: 0.8

vendor:sophosmodel: - scope: - version: -

Trust: 0.8

vendor:synologymodel: - scope: - version: -

Trust: 0.8

vendor:tp linkmodel: - scope: - version: -

Trust: 0.8

vendor:technicolormodel: - scope: - version: -

Trust: 0.8

vendor:texas instrumentsmodel: - scope: - version: -

Trust: 0.8

vendor:toshiba commercemodel: - scope: - version: -

Trust: 0.8

vendor:toshiba electronic devices storagemodel: - scope: - version: -

Trust: 0.8

vendor:toshiba memorymodel: - scope: - version: -

Trust: 0.8

vendor:turris omniamodel: - scope: - version: -

Trust: 0.8

vendor:ubiquitimodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:volumiomodel: - scope: - version: -

Trust: 0.8

vendor:watchguardmodel: - scope: - version: -

Trust: 0.8

vendor:xiaomimodel: - scope: - version: -

Trust: 0.8

vendor:xirrusmodel: - scope: - version: -

Trust: 0.8

vendor:zebramodel: - scope: - version: -

Trust: 0.8

vendor:zyxelmodel: - scope: - version: -

Trust: 0.8

vendor:dd wrtmodel: - scope: - version: -

Trust: 0.8

vendor:eeromodel: - scope: - version: -

Trust: 0.8

vendor:pfsensemodel: - scope: - version: -

Trust: 0.8

vendor:canonicalmodel:ubuntuscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:freebsdmodel:freebsdscope: - version: -

Trust: 0.8

vendor:opensusemodel:leapscope: - version: -

Trust: 0.8

vendor:susemodel:linux enterprise desktopscope: - version: -

Trust: 0.8

vendor:susemodel:linux enterprise point of salescope: - version: -

Trust: 0.8

vendor:susemodel:linux enterprise serverscope: - version: -

Trust: 0.8

vendor:susemodel:openstack cloudscope: - version: -

Trust: 0.8

vendor:w1 fimodel:hostapdscope: - version: -

Trust: 0.8

vendor:w1 fimodel:wpa supplicantscope: - version: -

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope: - version: -

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope: - version: -

Trust: 0.8

vendor:necmodel:edge gatewayscope:eqversion: -

Trust: 0.8

vendor:fujitsumodel:sr-m20ac1scope:lteversion:v02.10

Trust: 0.8

vendor:fujitsumodel:sr-m20ac2scope:lteversion:v02.10

Trust: 0.8

vendor:wi fimodel:alliance wi-fi protected access 2scope: - version: -

Trust: 0.6

vendor:siemensmodel:scalance w-700scope:eqversion:0

Trust: 0.6

vendor:intelmodel:atom processor c3200 series for yocto project bsp mr4scope: - version: -

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.2

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:6.1

Trust: 0.3

vendor:bdmodel:pyxis supplystationscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:sinamics smart access modulescope:eqversion:v200

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:11.6.27.3264

Trust: 0.3

vendor:ciscomodel:meraki mr34scope:eqversion:0

Trust: 0.3

vendor:pepperl fuchsmodel:ck71a-atexscope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.5.2.0

Trust: 0.3

vendor:applemodel:macbook airscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:18500

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:meraki mr26scope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.4

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:28000

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endian extended update supportscope:eqversion:-7.5

Trust: 0.3

vendor:ciscomodel:meraki mr84scope:eqversion:0

Trust: 0.3

vendor:phoenixmodel:contact fl wlanscope:eqversion:510x0

Trust: 0.3

vendor:microsoftmodel:windows server r2 for itanium-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:phoenixmodel:contact itcscope:eqversion:81130

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:10.0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726519.51.0.0

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-7.6

Trust: 0.3

vendor:ciscomodel:meraki mr18scope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:8.1.0.3

Trust: 0.3

vendor:siemensmodel:scalance w1750dscope:eqversion:0

Trust: 0.3

vendor:strykermodel:secure ii med-surg bedscope:eqversion:3002

Trust: 0.3

vendor:phoenixmodel:contact fl wlanscope:eqversion:210x0

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1015110

Trust: 0.3

vendor:ciscomodel:aironet access pointsscope:eqversion:0

Trust: 0.3

vendor:phoenixmodel:contact fl wlan apscope:eqversion:24802-110

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:11.0

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:eqversion:6.5.4.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2

Trust: 0.3

vendor:ciscomodel:wap371 wireless-ac n access point with single point setupscope:eqversion:0

Trust: 0.3

vendor:pepperl fuchsmodel:ex-handyscope:eqversion:2090

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.5.3.2

Trust: 0.3

vendor:phoenixmodel:contact rad-80211-xdscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:neversion:11.2

Trust: 0.3

vendor:phoenixmodel:contact fl wlan dapscope:eqversion:24802-110

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726519.10.9.1

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:6.3.1.25

Trust: 0.3

vendor:bdmodel:pyxis medstation esscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:wireless ip phonescope:eqversion:88210

Trust: 0.3

vendor:bdmodel:pyxis stockstation systemscope:eqversion:0

Trust: 0.3

vendor:applemodel:macbookscope:eqversion:0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316819.51.7.1

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:726519.10.9.2

Trust: 0.3

vendor:siemensmodel:scalance wlc712scope:eqversion:0

Trust: 0.3

vendor:phoenixmodel:contact fl wlan spascope:eqversion:0

Trust: 0.3

vendor:ciscomodel:meraki mr62scope:eqversion:0

Trust: 0.3

vendor:siemensmodel:simatic et200 pro im154-6 pn iwlanscope:eqversion:0

Trust: 0.3

vendor:abbmodel:tropos broadband mesh routers and bridgesscope:eqversion:0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:316819.10.9.2

Trust: 0.3

vendor:ciscomodel:meraki mr33scope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:neversion:6.5.3.3

Trust: 0.3

vendor:oraclemodel:micros handheld terminalscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:20120

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:eqversion:6.5.2

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316018.33.9.2

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1017030

Trust: 0.3

vendor:intelmodel:atom processor c3200 series for yocto project bsp mr4.1scope:neversion: -

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:2.6

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:7.1.0

Trust: 0.3

vendor:phoenixmodel:contact fl wlanscope:eqversion:110x0

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:100

Trust: 0.3

vendor:strykermodel:s3 med-surg bedscope:eqversion:3002

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.4.2.4

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.1

Trust: 0.3

vendor:phoenixmodel:contact fl comserver wlanscope:eqversion:232/422/4850

Trust: 0.3

vendor:applemodel:airport base stationscope:eqversion:7.6.8

Trust: 0.3

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:-7.

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:7.1.91.3272

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:neversion:4.2.4.9

Trust: 0.3

vendor:phoenixmodel:contact fl wlan apscope:eqversion:230802-110

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:6.1

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endian extended update suppscope:eqversion:-7.6

Trust: 0.3

vendor:ciscomodel:meraki mr14scope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux eus compute nodescope:eqversion:7.5

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:18150

Trust: 0.3

vendor:arubanetworksmodel:wireless client bridge 2.0.0.1-aruba501-b00scope:neversion:501

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-7.4

Trust: 0.3

vendor:redhatmodel:enterprise linux server tusscope:eqversion:-7.6

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726018.33.9.2

Trust: 0.3

vendor:applemodel:airport expressscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:meraki mr16scope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:clarity enginescope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:meraki mr30hscope:eqversion:0

Trust: 0.3

vendor:applemodel:airport extremescope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:20120

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:826520.0.2.3

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:8.0

Trust: 0.3

vendor:phoenixmodel:contact bl2 bpcscope:eqversion:0

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7

Trust: 0.3

vendor:applemodel:watchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:meraki mr32scope:eqversion:0

Trust: 0.3

vendor:w1 f1model:wpa supplicantscope:eqversion:2.4

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:4.0

Trust: 0.3

vendor:siemensmodel:ruggedcom rx1400scope:eqversion:0

Trust: 0.3

vendor:pepperl fuchsmodel:cn70a-atexscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1015110

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.5.3

Trust: 0.3

vendor:bdmodel:pyxis parx handheldscope:eqversion:0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726519.10

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:9.1.40.100

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.1.1

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:eqversion:6.5.3

Trust: 0.3

vendor:microsoftmodel:windows rtscope:eqversion:8.1

Trust: 0.3

vendor:ciscomodel:meraki mr42scope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:neversion:4.3.1.6

Trust: 0.3

vendor:applemodel:airport base stationscope:eqversion:7.7.3

Trust: 0.3

vendor:ciscomodel:wap561 wireless-n dual radio selectable band access pointscope:eqversion:0

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:11.0.26.3000

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:neversion:6.5.4.2

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:11.6

Trust: 0.3

vendor:applemodel:tvosscope:neversion:11.2

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:2016

Trust: 0.3

vendor:phoenixmodel:contact rad-whg/wlan-xdscope:eqversion:0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:726018.33.9.3

Trust: 0.3

vendor:applemodel:wi-fi update for boot campscope:neversion:6.4.0

Trust: 0.3

vendor:toshibamodel:suremark printer 2nrscope:eqversion:4610

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:7.1.1

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:6.5.4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endian extended update suppscope:eqversion:-7.5

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endianscope:eqversion:7

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:826520.0.0.0

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2.1

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.3.1.8

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:bdmodel:pyxis supply rollerscope:eqversion:0

Trust: 0.3

vendor:applemodel:airport base stationscope:eqversion:7.6.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3

Trust: 0.3

vendor:ciscomodel:telepresence collaboration endpointscope:eqversion:0

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:6.2.61.3535

Trust: 0.3

vendor:phoenixmodel:contact vmtscope:eqversion:70xx0

Trust: 0.3

vendor:applemodel:imacscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:meraki mr72scope:eqversion:0

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endian extended update suppscope:eqversion:-7.4

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:11.0.25.3001

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:8.1.0.4

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:9.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server tusscope:eqversion:-7.4

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:meraki mr53scope:eqversion:0

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.1

Trust: 0.3

vendor:ciscomodel:wap551 wireless-n single radio selectable band access pointscope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:eqversion:4.2

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:eqversion:6.5.3.2

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316519.10

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:826020.0.0.0

Trust: 0.3

vendor:ciscomodel:wap121 wireless-n access point with single point setupscope:eqversion:0

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:2.5

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:11.6.0.1000

Trust: 0.3

vendor:arubanetworksmodel:wireless client bridge 1.0.1.3-hp501-b0012scope:neversion:501

Trust: 0.3

vendor:pepperl fuchsmodel:i.roc ci70-exscope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.5.0.0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:826020.0.2.2

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:7.1

Trust: 0.3

vendor:pepperl fuchsmodel:cn70e-atexscope:eqversion:0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726018.0.0.0

Trust: 0.3

vendor:ciscomodel:meraki mr24scope:eqversion:0

Trust: 0.3

vendor:toshibamodel:suremark printer 1nrscope:eqversion:4610

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systems extended update supportscope:eqversion:-7.6

Trust: 0.3

vendor:phoenixmodel:contact vmtscope:eqversion:50xx0

Trust: 0.3

vendor:ciscomodel:meraki mr74scope:eqversion:0

Trust: 0.3

vendor:pepperl fuchsmodel:ex-handyscope:eqversion:090

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.4.4.15

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316519.51.7.1

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:726519.51.7.20

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility clientscope:eqversion:0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726519.51.7.1

Trust: 0.3

vendor:espressifmodel:systems esp32scope:eqversion:0

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:4.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-7.5

Trust: 0.3

vendor:oraclemodel:micros handheld terminal 2.03.0.0.021rscope:neversion: -

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:38000

Trust: 0.3

vendor:bdmodel:pyxis parxscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:dx70scope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:6.5.1.9

Trust: 0.3

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:-7.6

Trust: 0.3

vendor:strykermodel:intouch critical care bedscope:eqversion:2141

Trust: 0.3

vendor:bdmodel:pyxis anesthesia esscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:aironet series officeextend access pointsscope:eqversion:18100

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:8.10

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316819.10.9.1

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:10.0.55.3000

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:8.10

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:meraki mr66scope:eqversion:0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316519.10.9.1

Trust: 0.3

vendor:applemodel:airport base stationscope:eqversion:7.6

Trust: 0.3

vendor:strykermodel:intouch critical care bedscope:eqversion:2131

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:7.1.2

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:18300

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:-7.6

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endian extended update supportscope:eqversion:-7.6

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:10.0.0.50.1004

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.4.1.0

Trust: 0.3

vendor:ciscomodel:wap321 wireless-n access point with single point setupscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:simatic iwlan-pb/linkscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:aironet 1810w series access pointsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:meraki mr52scope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systems extended update supportscope:eqversion:-7.5

Trust: 0.3

vendor:ciscomodel:meraki mr12scope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:airmesh msrscope:eqversion:0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:316519.51.7.20

Trust: 0.3

vendor:applemodel:watchosscope:neversion:4.2

Trust: 0.3

vendor:phoenixmodel:contact fl wlan ecscope:eqversion:24802-110

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:eqversion:4.2.4.8

Trust: 0.3

vendor:espressifmodel:systems esp8266scope:eqversion:0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:0

Trust: 0.3

vendor:pepperl fuchsmodel:pad-exscope:eqversion:010

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:11.0.0.1205

Trust: 0.3

vendor:ciscomodel:ip phonescope:eqversion:88610

Trust: 0.3

vendor:arubanetworksmodel:clarity enginescope:neversion:1.0.0.1

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:15600

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systems sp1scope:eqversion:7

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:eqversion:4.3.1.5

Trust: 0.3

vendor:applemodel:airport base stationscope:eqversion:7.6.2

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:8.1

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:11.8

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systems sp1scope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systems extended update supportscope:eqversion:-7.4

Trust: 0.3

vendor:ciscomodel:meraki mr58scope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1016070

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:316519.10.9.2

Trust: 0.3

vendor:bdmodel:pyxis parassist systemscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systems sp2scope:eqversion:2008

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:eqversion:4.3

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:7.0

Trust: 0.3

vendor:siemensmodel:simatic mobile panel 277 iwlanscope:eqversion:0

Trust: 0.3

vendor:bdmodel:pyxis medstation t2scope:eqversion:40000

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:826020.0.2.3

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:airport base stationscope:eqversion:7.6.1

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316519.51.0.0

Trust: 0.3

vendor:applemodel:wi-fi update for boot campscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:-7.4

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:phoenixmodel:contact vmtscope:eqversion:30xx0

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:7

Trust: 0.3

vendor:w1 f1model:wpa supplicantscope:eqversion:2.6

Trust: 0.3

vendor:arubanetworksmodel:wireless client bridgescope:eqversion:5010

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.0.1

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:11.5

Trust: 0.3

vendor:ciscomodel:meraki mr11scope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.3

Trust: 0.3

vendor:bdmodel:pyxis anesthesia systemscope:eqversion:40000

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2.2

Trust: 0.3

vendor:bdmodel:pyxis anesthesia systemscope:eqversion:35000

Trust: 0.3

vendor:rockwellmodel:automation stratix 15.3 jc1scope:eqversion:5100

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:-7.4

Trust: 0.3

vendor:bdmodel:pyxis ciisafe workstationscope:eqversion:??0

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endian extended update supportscope:eqversion:-7.4

Trust: 0.3

vendor:applemodel:airport base stationscope:eqversion:7.6.7

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316819.51.0.0

Trust: 0.3

vendor:applemodel:ipad airscope:eqversion:0

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:7.0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.5.4.1

Trust: 0.3

vendor:redhatmodel:enterprise linux eus compute nodescope:eqversion:7.6

Trust: 0.3

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:7

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:8.1.71.3608

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:9.1.41.3024

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.4.2.1

Trust: 0.3

vendor:redhatmodel:enterprise linux eus compute nodescope:eqversion:7.4

Trust: 0.3

vendor:ciscomodel:dx80scope:eqversion:0

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:9.0

Trust: 0.3

vendor:phoenixmodel:contact bl2 ppcscope:eqversion:0

Trust: 0.3

vendor:phoenixmodel:contact tpcscope:eqversion:60130

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.5.1

Trust: 0.3

vendor:pepperl fuchsmodel:ck70a-atexscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.1

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:316819.51.7.20

Trust: 0.3

vendor:applemodel:macbook proscope:eqversion:0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316819.10

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:100

Trust: 0.3

vendor:applemodel:airport base stationscope:eqversion:7.7.8

Trust: 0.3

vendor:intelmodel:active management technologyscope:eqversion:9.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:airport base stationscope:eqversion:7.6.4

Trust: 0.3

vendor:pepperl fuchsmodel:smart-exscope:eqversion:010

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:826520.0.2.2

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:316018.33.9.3

Trust: 0.3

vendor:pepperl fuchsmodel:tab-exscope:eqversion:010

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:6.5.3.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:macminiscope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:6.4.4.16

Trust: 0.3

vendor:phoenixmodel:contact fl wlan epascope:eqversion:0

Trust: 0.3

vendor:applemodel:airport time capsulescope:eqversion:0

Trust: 0.3

vendor:wi fimodel:alliance wpa2 (wi-fi protected accessscope:eqversion:2)0

Trust: 0.3

vendor:applemodel:airport base stationscope:neversion:7.7.9

Trust: 0.3

vendor:siemensmodel:scalance wlc711scope:eqversion:0

Trust: 0.3

vendor:siemensmodel:ruggedcom rs9xxwscope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.3.1.15

Trust: 0.3

vendor:ubiquitimodel:networks unifi access pointscope:eqversion:0

Trust: 0.3

vendor:toshibamodel:suremark printer 2crscope:eqversion:4610

Trust: 0.3

vendor:ciscomodel:ip phonescope:eqversion:88650

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:6.5.4

Trust: 0.3

vendor:applemodel:airport base stationscope:eqversion:7.7.7

Trust: 0.3

vendor:arubanetworksmodel:instantosscope:eqversion:6.5.4

Trust: 0.3

vendor:ciscomodel:asa 5506w-x w/ firepower servicesscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1016070

Trust: 0.3

vendor:applemodel:airport base stationscope:neversion:7.6.9

Trust: 0.3

vendor:strykermodel:s3 med-surg bedscope:eqversion:3005

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316018.0.0.0

Trust: 0.3

vendor:pepperl fuchsmodel:smart-exscope:eqversion:2010

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1017030

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.1

Trust: 0.3

vendor:wi fimodel:alliancescope:eqversion:*

Trust: 0.2

vendor:wi fimodel:protected access 2scope: - version: -

Trust: 0.2

sources: IVD: 37a5aa3e-4512-466b-9bc5-af5013c143e3 // CERT/CC: VU#228519 // CNVD: CNVD-2017-30400 // BID: 101274 // JVNDB: JVNDB-2017-009176 // NVD: CVE-2017-13084 // CNNVD: CNNVD-201710-386

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2017-13084
value: MEDIUM

Trust: 1.8

CNVD: CNVD-2017-30400
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201710-386
value: MEDIUM

Trust: 0.6

IVD: 37a5aa3e-4512-466b-9bc5-af5013c143e3
value: MEDIUM

Trust: 0.2

VULMON: CVE-2017-13084
value: MEDIUM

Trust: 0.1

NVD:
severity: MEDIUM
baseScore: 5.4
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 6.4
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2017-13084
severity: MEDIUM
baseScore: 5.4
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:P
accessVector: ADJACENT NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.9

CNVD: CNVD-2017-30400
severity: MEDIUM
baseScore: 5.4
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 37a5aa3e-4512-466b-9bc5-af5013c143e3
severity: MEDIUM
baseScore: 5.4
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

NVD:
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: ADJACENT_NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 5.2
version: 3.0

Trust: 1.0

NVD: CVE-2017-13084
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: ADJACENT NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 37a5aa3e-4512-466b-9bc5-af5013c143e3 // CNVD: CNVD-2017-30400 // VULMON: CVE-2017-13084 // JVNDB: JVNDB-2017-009176 // NVD: CVE-2017-13084 // CNNVD: CNNVD-201710-386

PROBLEMTYPE DATA

problemtype:CWE-330

Trust: 1.0

problemtype:CWE-254

Trust: 0.8

sources: JVNDB: JVNDB-2017-009176 // NVD: CVE-2017-13084

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201710-386

TYPE

security feature problem

Trust: 0.6

sources: CNNVD: CNNVD-201710-386

CONFIGURATIONS

sources: NVD: CVE-2017-13084

PATCH

title:ARUBA-PSA-2017-007url:http://www.arubanetworks.com/assets/alert/aruba-psa-2017-007.txt

Trust: 0.8

title:LEN-17420url:https://support.lenovo.com/jp/en/product_security/len-17420

Trust: 0.8

title:NV17-024url:http://jpn.nec.com/security-info/secinfo/nv17-024.html

Trust: 0.8

title:KRACKs - wpa_supplicant Multiple Vulnerabilitiesurl:https://access.redhat.com/security/vulnerabilities/kracks

Trust: 0.8

title:WPA packet number reuse with replayed messages and key reinstallationurl:https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt

Trust: 0.8

title:Wi-Fiの認証/暗号化技術WPA2およびWPAの複数の脆弱性についてurl:http://www.fujitsu.com/jp/products/network/support/2017/srm-01/index.html

Trust: 0.8

title:WPA2の脆弱性に関する弊社調査・対応状況についてurl:http://www.iodata.jp/support/information/2017/wpa2/

Trust: 0.8

title:無線LAN 認証/暗号化技術WPA2およびWPAに関する脆弱性のお知らせurl:http://www.fmworld.net/biz/common/info/20171110/

Trust: 0.8

title:Patch for WPA2 Wireless Network STK Key Reload Vulnerabilityurl:https://www.cnvd.org.cn/patchinfo/show/103824

Trust: 0.6

title:Multiple WiFi product WPA2 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=75500

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2017/10/16/wpa2_inscure_krackattack/

Trust: 0.2

title:Red Hat: CVE-2017-13084url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2017-13084

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=cve-2017-13084

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=6df91267eee9400a24a98876f50ffe84

Trust: 0.1

title:Cisco: Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access IIurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20171016-wpa

Trust: 0.1

title:KRACKurl:https://github.com/chinatso/krack

Trust: 0.1

title:krackinfourl:https://github.com/kristate/krackinfo

Trust: 0.1

title: - url:https://github.com/merlinepedra/krack

Trust: 0.1

title:nixos-issue-db-exampleurl:https://github.com/andir/nixos-issue-db-example

Trust: 0.1

sources: CNVD: CNVD-2017-30400 // VULMON: CVE-2017-13084 // JVNDB: JVNDB-2017-009176 // CNNVD: CNNVD-201710-386

EXTERNAL IDS

db:CERT/CCid:VU#228519

Trust: 4.2

db:NVDid:CVE-2017-13084

Trust: 3.7

db:BIDid:101274

Trust: 2.6

db:LENOVOid:LEN-17420

Trust: 2.5

db:SECTRACKid:1039581

Trust: 1.7

db:SECTRACKid:1039576

Trust: 1.7

db:SECTRACKid:1039577

Trust: 1.7

db:SIEMENSid:SSA-901333

Trust: 1.7

db:ICS CERTid:ICSA-17-318-01

Trust: 1.1

db:CNVDid:CNVD-2017-30400

Trust: 0.8

db:CNNVDid:CNNVD-201710-386

Trust: 0.8

db:JUNIPERid:JSA10827

Trust: 0.8

db:DLINKid:SAP10075

Trust: 0.8

db:JVNid:JVNVU90609033

Trust: 0.8

db:ICS CERTid:ICSA-17-318-02A

Trust: 0.8

db:JVNDBid:JVNDB-2017-009176

Trust: 0.8

db:ICS CERTid:ICSA-17-299-02

Trust: 0.3

db:ICS CERTid:ICSMA-19-029-01

Trust: 0.3

db:ICS CERTid:ICSA-17-353-02

Trust: 0.3

db:ICS CERTid:ICSA-17-318-02

Trust: 0.3

db:ICS CERTid:ICSMA-18-114-01

Trust: 0.3

db:ICS CERTid:ICSA-17-325-01

Trust: 0.3

db:IVDid:37A5AA3E-4512-466B-9BC5-AF5013C143E3

Trust: 0.2

db:VULMONid:CVE-2017-13084

Trust: 0.1

db:PACKETSTORMid:144663

Trust: 0.1

sources: IVD: 37a5aa3e-4512-466b-9bc5-af5013c143e3 // CERT/CC: VU#228519 // CNVD: CNVD-2017-30400 // VULMON: CVE-2017-13084 // BID: 101274 // JVNDB: JVNDB-2017-009176 // PACKETSTORM: 144663 // NVD: CVE-2017-13084 // CNNVD: CNNVD-201710-386

REFERENCES

url:https://www.krackattacks.com/

Trust: 3.7

url:http://www.securityfocus.com/bid/101274

Trust: 2.9

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2017-007.txt

Trust: 2.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171016-wpa

Trust: 2.8

url:https://access.redhat.com/security/vulnerabilities/kracks

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/228519

Trust: 2.1

url:https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt

Trust: 1.8

url:http://www.securitytracker.com/id/1039581

Trust: 1.7

url:http://www.securitytracker.com/id/1039577

Trust: 1.7

url:http://www.securitytracker.com/id/1039576

Trust: 1.7

url:https://support.lenovo.com/us/en/product_security/len-17420

Trust: 1.7

url:https://security.gentoo.org/glsa/201711-03

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf

Trust: 1.7

url:https://source.android.com/security/bulletin/2017-11-01

Trust: 1.6

url:https://papers.mathyvanhoef.com/ccs2017.pdf

Trust: 1.1

url:https://w1.fi/security/2017-1/

Trust: 1.1

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00101&languageid=en-fr

Trust: 1.1

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-13080

Trust: 1.1

url:https://ics-cert.us-cert.gov/advisories/icsa-17-318-01

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13084

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2017-13084

Trust: 0.9

url:https://cwe.mitre.org/data/definitions/323.html

Trust: 0.8

url:https://actiontecsupport.zendesk.com/hc/en-us/articles/115005205283-krack-vulnerability

Trust: 0.8

url:https://www3.aerohive.com/support/security-bulletins/product-security-announcement-aerohives-response-to-krack-10162017.html

Trust: 0.8

url:https://www.al-enterprise.com/en/support/security-alert-krack

Trust: 0.8

url:https://support.apple.com/en-gb/ht208222

Trust: 0.8

url:https://security.archlinux.org/avg-447

Trust: 0.8

url:https://www.asus.com/static_webpage/asus-product-security-advisory/

Trust: 0.8

url:https://community.barracudanetworks.com/forum/index.php?/topic/23525-security-advisories/page-2

Trust: 0.8

url:https://lists.centos.org/pipermail/centos-announce/2017-october/022569.html

Trust: 0.8

url:https://community.cypress.com/docs/doc-13871

Trust: 0.8

url:http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10075

Trust: 0.8

url:https://www.debian.org/security/2017/dsa-3999

Trust: 0.8

url:http://www.dell.com/support/article/sln307822

Trust: 0.8

url:https://github.com/espressif/esp8266_nonos_sdk

Trust: 0.8

url:https://extremeportal.force.com/extrarticledetail?n=000018005

Trust: 0.8

url:https://bodhi.fedoraproject.org/updates/fedora-2017-60bfb576b7

Trust: 0.8

url:http://www.fortiguard.com/psirt/fg-ir-17-196

Trust: 0.8

url:https://www.freebsd.org/security/advisories/freebsd-sa-17:07.wpa.asc

Trust: 0.8

url:https://bugs.gentoo.org/634440

Trust: 0.8

url:https://support.hpe.com/hpsc/doc/public/display?sp4ts.oid=null&doclocale=en_us&docid=emr_na-a00029151en_us

Trust: 0.8

url:https://kb.juniper.net/jsa10827

Trust: 0.8

url:https://support.lenovo.com/ca/en/product_security/len-17420

Trust: 0.8

url:http://www.microchip.com/wwwproducts/en/atwinc1500

Trust: 0.8

url:http://mail-index.netbsd.org/source-changes/2017/10/16/msg088877.html

Trust: 0.8

url:https://kb.netgear.com/000049498/security-advisory-for-wpa-2-vulnerabilities-psv-2017-2826-psv-2017-2836-psv-2017-2837

Trust: 0.8

url:https://forum.peplink.com/t/security-advisory-wpa2-vulnerability-vu-228519/12715

Trust: 0.8

url:https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-101617-v1.0.pdf

Trust: 0.8

url:https://www.suse.com/de-de/support/kb/doc/?id=7022107

Trust: 0.8

url:https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---wpa-and-wpa2-vulnerabilities/

Trust: 0.8

url:http://www.slackware.com/changelog/stable.php?cpu=x86_64

Trust: 0.8

url:https://community.sophos.com/kb/en-us/127658

Trust: 0.8

url:https://www.toshibacommerce.com/wps/myportal/%21ut/p/a1/rzrnc8igeiz_sw8egqhjcdmmwr8abw2dqcnfoyqotidrrk399uxrrwotuzgws7a87y6z88iuzmcq2u4uwcnlzypjnjj5-exr_wnhya-laxtrid-j3uchdtb8gylmuw6qzgktovtowsrrqlrs6-8dbeqhwc1mykqnlabgdjlf1yjvn7i5af4qtdwsn2tri7j

Trust: 0.8

url:http://www.toshiba-personalstorage.net/en/news/hdd/ot_notice/20171017.htm

Trust: 0.8

url:http://support.toshiba.com/support/staticcontentdetail?contentid=4015875&isfromtoclink=false

Trust: 0.8

url:https://community.ubnt.com/t5/unifi-updates-blog/firmware-3-9-3-7537-for-uap-usw-has-been-released/ba-p/2099365

Trust: 0.8

url:https://usn.ubuntu.com/usn/usn-3455-1/

Trust: 0.8

url:http://en.miui.com/thread-954223-1-1.html

Trust: 0.8

url:https://www.zebra.com/content/dam/zebra_new_ia/en-us/support-and-downloads/lifeguard-security/krack-security-bulletin.pdf

Trust: 0.8

url:http://www.zyxel.com/support/announcement_wpa2_key_management.shtml

Trust: 0.8

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk120938

Trust: 0.8

url:https://community.rsa.com/docs/doc-84103

Trust: 0.8

url:https://support.f5.com/csp/article/k23642330

Trust: 0.8

url:https://forum.mikrotik.com/viewtopic.php?f=21&t=126695

Trust: 0.8

url:https://community.linksys.com/t5/wireless-routers/krack-vulnerability/td-p/1218573

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-17-318-02a

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20171017_wpa2.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90609033/index.html

Trust: 0.8

url:https://www.kb.cert.org/vuls/id/cheu-aqnmyp

Trust: 0.8

url:https://www.kb.cert.org/vuls/id/228519/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2017-13084

Trust: 0.4

url:https://github.com/stevenhoneyman/wpa_gui/tree/master/wpa_supplicant-2.4

Trust: 0.3

url:http://www.wi-fi.org/index.php

Trust: 0.3

url:https://support.apple.com/en-ie/ht208847

Trust: 0.3

url:https://support.apple.com/en-in/ht208334

Trust: 0.3

url:https://support.apple.com/en-in/ht208327

Trust: 0.3

url:https://support.apple.com/en-in/ht208325

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-353-02

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsma-18-114-01

Trust: 0.3

url:https://lists.apple.com/archives/security-announce/2017/dec/msg00009.html

Trust: 0.3

url:https://lists.apple.com/archives/security-announce/2017/dec/msg00008.html

Trust: 0.3

url:https://lists.apple.com/archives/security-announce/2018/jul/msg00000.html

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-13077

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-13078

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-13079

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-13080

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-13081

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-13082

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-13086

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-13087

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-13088

Trust: 0.3

url:http://docs.fortinet.com/uploaded/files/3961/fortiap-v5.6.1-release-notes.pdf

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-299-02

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-318-02

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-325-01

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsma-19-029-01

Trust: 0.3

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

Trust: 0.3

url:https://access.redhat.com/errata/rhsa-2017:2907

Trust: 0.3

url:https://access.redhat.com/errata/rhsa-2017:2911

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/330.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/kristate/krackinfo

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13078

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13078

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13080

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13082

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13077

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13087

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13081

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13081

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13086

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13082

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13087

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13086

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13077

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13079

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13080

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13079

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13088

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

sources: CERT/CC: VU#228519 // CNVD: CNVD-2017-30400 // VULMON: CVE-2017-13084 // BID: 101274 // JVNDB: JVNDB-2017-009176 // PACKETSTORM: 144663 // NVD: CVE-2017-13084 // CNNVD: CNNVD-201710-386

CREDITS

Mathy Vanhoef from imec-DistriNet and KU Leuven.

Trust: 0.9

sources: BID: 101274 // CNNVD: CNNVD-201710-386

SOURCES

db:IVDid:37a5aa3e-4512-466b-9bc5-af5013c143e3
db:CERT/CCid:VU#228519
db:CNVDid:CNVD-2017-30400
db:VULMONid:CVE-2017-13084
db:BIDid:101274
db:JVNDBid:JVNDB-2017-009176
db:PACKETSTORMid:144663
db:NVDid:CVE-2017-13084
db:CNNVDid:CNNVD-201710-386

LAST UPDATE DATE

2023-12-18T10:44:55.150000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#228519date:2017-11-16T00:00:00
db:CNVDid:CNVD-2017-30400date:2017-10-17T00:00:00
db:VULMONid:CVE-2017-13084date:2019-10-03T00:00:00
db:BIDid:101274date:2019-02-21T09:00:00
db:JVNDBid:JVNDB-2017-009176date:2018-02-01T00:00:00
db:NVDid:CVE-2017-13084date:2019-10-03T00:03:26.223
db:CNNVDid:CNNVD-201710-386date:2019-10-23T00:00:00

SOURCES RELEASE DATE

db:IVDid:37a5aa3e-4512-466b-9bc5-af5013c143e3date:2017-10-17T00:00:00
db:CERT/CCid:VU#228519date:2017-10-16T00:00:00
db:CNVDid:CNVD-2017-30400date:2017-10-18T00:00:00
db:VULMONid:CVE-2017-13084date:2017-10-17T00:00:00
db:BIDid:101274date:2017-10-16T00:00:00
db:JVNDBid:JVNDB-2017-009176date:2017-11-06T00:00:00
db:PACKETSTORMid:144663date:2017-10-18T20:44:00
db:NVDid:CVE-2017-13084date:2017-10-17T13:29:00.520
db:CNNVDid:CNNVD-201710-386date:2017-10-17T00:00:00