Statements (18)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:CVE_Identifier
|
| gptkbp:affects |
gptkb:WPA2_protocol
Wi-Fi devices |
| gptkbp:cvssV3Score |
5.8
|
| gptkbp:cvssV3Severity |
gptkb:medium
|
| gptkbp:describes |
A vulnerability in the WPA2 protocol allowing key reinstallation attacks (KRACK) due to improper handling of handshake messages.
|
| gptkbp:discoveredBy |
gptkb:Mathy_Vanhoef
|
| gptkbp:exploits |
Yes
|
| gptkbp:hasCWE |
gptkb:CWE-323
|
| gptkbp:impact |
Allows attackers to decrypt, replay, and forge packets
|
| gptkbp:patchedBy |
Various vendor updates
|
| gptkbp:publicationDate |
2017-10-16
|
| gptkbp:relatedTo |
gptkb:KRACK
|
| gptkbp:vectorFor |
gptkb:network_protocol
|
| gptkbp:vulnerableTo |
gptkb:KRACK_attack
|
| gptkbp:bfsParent |
gptkb:KRACK_attack
|
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
CVE-2017-13088
|