Summary
Detail | |||
---|---|---|---|
Vendor | Suse | First view | 2017-10-16 |
Product | Openstack Cloud | Last view | 2017-10-17 |
Version | 6 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:suse:openstack_cloud |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.3 | 2017-10-17 | CVE-2017-13088 | Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients. |
5.3 | 2017-10-17 | CVE-2017-13087 | Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients. |
6.8 | 2017-10-17 | CVE-2017-13086 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. |
6.8 | 2017-10-17 | CVE-2017-13084 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. |
8.1 | 2017-10-17 | CVE-2017-13082 | Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. |
5.3 | 2017-10-17 | CVE-2017-13081 | Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients. |
5.3 | 2017-10-17 | CVE-2017-13080 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients. |
5.3 | 2017-10-17 | CVE-2017-13079 | Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients. |
5.3 | 2017-10-17 | CVE-2017-13078 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients. |
6.8 | 2017-10-16 | CVE-2017-13077 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (10) | CWE-330 | Use of Insufficiently Random Values |
Snort® IPS/IDS
Date | Description |
---|---|
2017-11-28 | WPA2 key reuse tool attempt RuleID : 44640 - Type : POLICY-OTHER - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2911.nasl - Type: ACT_GATHER_INFO |
2018-11-13 | Name: The remote Debian host is missing a security update. File: debian_DLA-1573.nasl - Type: ACT_GATHER_INFO |
2018-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2017-fc21e3856b.nasl - Type: ACT_GATHER_INFO |
2018-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2017-f45e844a85.nasl - Type: ACT_GATHER_INFO |
2018-01-08 | Name: The device is vulnerable to key reinstallation attacks (KRACK). File: juniper_jsa10827_krack.nasl - Type: ACT_GATHER_INFO |
2017-12-14 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1317.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3265-1.nasl - Type: ACT_GATHER_INFO |
2017-12-11 | Name: The remote Debian host is missing a security update. File: debian_DLA-1200.nasl - Type: ACT_GATHER_INFO |
2017-12-06 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-3505-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3147-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3145-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3146-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3148-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3149-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3150-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3151-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3153-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3154-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3157-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3158-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3160-1.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3152-1.nasl - Type: ACT_GATHER_INFO |
2017-11-30 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3124-1.nasl - Type: ACT_GATHER_INFO |
2017-11-30 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3117-1.nasl - Type: ACT_GATHER_INFO |
2017-11-30 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3118-1.nasl - Type: ACT_GATHER_INFO |