Vulnerability in Wi-Fi Protected Access (WPA and WPA2) by Cisco Systems
CVE-2017-13077
Key Information:
- Vendor
Wi-fi Alliance
- Vendor
- CVE Published:
- 17 October 2017
What is CVE-2017-13077?
The Wi-Fi Protected Access (WPA and WPA2) protocols exhibit a vulnerability that allows an attacker within the radio range to exploit weaknesses during the four-way handshake. By enabling reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK), an adversary can replay, decrypt, or spoof network frames, jeopardizing the confidentiality and integrity of the data transmitted over Wi-Fi networks. This security flaw necessitates immediate action to mitigate risks associated with unauthorized access and exploitation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Wi-Fi Protected Access (WPA and WPA2) WPA
Wi-Fi Protected Access (WPA and WPA2) WPA2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
