Statements (22)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:CVE_Identifier
|
| gptkbp:affects |
gptkb:Android
gptkb:Windows gptkb:macOS gptkb:OpenBSD gptkb:Linux gptkb:Wi-Fi_Protected_Access_II_(WPA2) |
| gptkbp:alsoKnownAs |
gptkb:KRACK_vulnerability
|
| gptkbp:citation |
https://nvd.nist.gov/vuln/detail/CVE-2017-13082
https://www.krackattacks.com/ |
| gptkbp:cweId |
gptkb:CWE-323
|
| gptkbp:describes |
A vulnerability in WPA2 protocol allowing key reinstallation attacks (KRACK) that can lead to traffic decryption and manipulation.
|
| gptkbp:discoveredBy |
gptkb:Mathy_Vanhoef
|
| gptkbp:hasCVSSScore |
5.4
|
| gptkbp:impact |
Allows attackers to decrypt, replay, and forge packets
|
| gptkbp:patchedBy |
WPA2 protocol updates
|
| gptkbp:publicDisclosure |
2017-10-16
|
| gptkbp:vectorFor |
Network proximity
|
| gptkbp:vulnerableTo |
gptkb:Key_Reinstallation_Attack
|
| gptkbp:bfsParent |
gptkb:KRACK_attack
|
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
CVE-2017-13082
|