CVE-2017-13080

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

References

http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html

http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html

http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt

http://www.debian.org/security/2017/dsa-3999

http://www.kb.cert.org/vuls/id/228519

http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

http://www.securityfocus.com/bid/101274

http://www.securitytracker.com/id/1039572

http://www.securitytracker.com/id/1039573

http://www.securitytracker.com/id/1039576

http://www.securitytracker.com/id/1039577

http://www.securitytracker.com/id/1039578

http://www.securitytracker.com/id/1039581

http://www.securitytracker.com/id/1039585

http://www.securitytracker.com/id/1039703

http://www.ubuntu.com/usn/USN-3455-1

https://access.redhat.com/errata/RHSA-2017:2907

https://access.redhat.com/errata/RHSA-2017:2911

https://access.redhat.com/security/vulnerabilities/kracks

https://cert.vde.com/en-us/advisories/vde-2017-003

https://cert.vde.com/en-us/advisories/vde-2017-005

https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf

https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html

https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080

https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc

https://security.gentoo.org/glsa/201711-03

https://source.android.com/security/bulletin/2017-11-01

https://support.apple.com/HT208219

https://support.apple.com/HT208220

https://support.apple.com/HT208221

https://support.apple.com/HT208222

https://support.apple.com/HT208325

https://support.apple.com/HT208327

https://support.apple.com/HT208334

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us

https://support.lenovo.com/us/en/product_security/LEN-17420

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa

https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html

https://www.krackattacks.com/

Details

Source: MITRE

Published: 2017-10-17

Updated: 2020-11-10

Type: CWE-330

Risk Information

CVSS v2

Base Score: 2.9

Vector: AV:A/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 5.5

Severity: LOW

CVSS v3

Base Score: 5.3

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Impact Score: 3.6

Exploitability Score: 1.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.4:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11.1:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.2.5:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.2.6:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.2.8:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.3.7:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.3.9:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.3.10:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.3.11:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.4.7:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.4.8:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.4.9:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.4.10:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.4.11:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.5.7:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.5.8:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.5.9:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.5.10:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.5.11:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.6.8:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.6.9:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.6.10:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:2.5:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:hostapd:2.6:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.2.5:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.2.6:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.2.7:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.2.8:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.3.7:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.3.8:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.3.9:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.3.10:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.3.11:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.4.7:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.4.8:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.4.9:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.4.10:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.4.11:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.5.7:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.5.8:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.5.9:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.5.10:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.5.11:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.6.8:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.6.9:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.6.10:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:2.5:*:*:*:*:*:*:*

cpe:2.3:a:w1.fi:wpa_supplicant:2.6:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*

cpe:2.3:o:suse:openstack_cloud:6:*:*:*:*:*:*:*

Tenable Plugins

View all (96 total)

IDNameProductFamilySeverity
143704SUSE SLES12 Security Update : wpa_supplicant (SUSE-SU-2020:3424-1) (KRACK)NessusSuSE Local Security Checks
high
143627SUSE SLED15 / SLES15 Security Update : wpa_supplicant (SUSE-SU-2020:3380-1) (KRACK)NessusSuSE Local Security Checks
high
143321openSUSE Security Update : wpa_supplicant (openSUSE-2020-2053) (KRACK)NessusSuSE Local Security Checks
high
143304openSUSE Security Update : wpa_supplicant (openSUSE-2020-2059) (KRACK)NessusSuSE Local Security Checks
high
137516EulerOS 2.0 SP2 : kernel (EulerOS-SA-2020-1674)NessusHuawei Local Security Checks
critical
127365NewStart CGSL MAIN 4.05 : wpa_supplicant Multiple Vulnerabilities (NS-SA-2019-0120)NessusNewStart CGSL Local Security Checks
medium
124925EulerOS Virtualization 3.0.1.0 : wpa_supplicant (EulerOS-SA-2019-1422)NessusHuawei Local Security Checks
high
124917EulerOS Virtualization for ARM 64 3.0.1.0 : wpa_supplicant (EulerOS-SA-2019-1414)NessusHuawei Local Security Checks
high
700544Apple iOS < 11.2 Multiple Vulnerabilities (APPLE-SA-2017-12-13-6)Nessus Network MonitorMobile Devices
high
700543Apple iOS < 11.1 Multiple VulnerabilitiesNessus Network MonitorMobile Devices
high
700512macOS 10.13.x < 10.13.1 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
critical
119233Virtuozzo 6 : wpa_supplicant (VZLSA-2017-2911)NessusVirtuozzo Local Security Checks
medium
118888Debian DLA-1573-1 : firmware-nonfree security update (KRACK)NessusDebian Local Security Checks
critical
109037pfSense < 2.3.5 Multiple Vulnerabilities (KRACK)NessusFirewalls
critical
108786macOS 10.13.x < 10.13.4 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
106004Fedora 27 : 1:wpa_supplicant (2017-f45e844a85) (KRACK)NessusFedora Local Security Checks
high
105685SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0040-1) (BlueBorne) (KRACK) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105654Juniper ScreenOS 6.3 SSG-5 and SSG-20 (KRACK)NessusFirewalls
medium
105653Junos OS 12.1X46 SRX 210, 240, 650 series firewalls (KRACK)NessusFirewalls
medium
105219openSUSE Security Update : kernel-firmware (openSUSE-2017-1317) (KRACK)NessusSuSE Local Security Checks
medium
105172SUSE SLES11 Security Update : kernel (SUSE-SU-2017:3265-1) (KRACK)NessusSuSE Local Security Checks
critical
105151Intel Management Engine Multiple WPA2 Vulnerabilities (INTEL-SA-00101)NessusWindows
medium
105116Debian DLA-1200-1 : linux security update (KRACK)NessusDebian Local Security Checks
high
105075Apple iOS < 11.2 Multiple VulnerabilitiesNessusMobile Devices
high
105038Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : linux-firmware vulnerabilities (USN-3505-1) (KRACK)NessusUbuntu Local Security Checks
medium
104965SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3160-1) (KRACK)NessusSuSE Local Security Checks
high
104964SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3158-1) (KRACK)NessusSuSE Local Security Checks
high
104963SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3157-1) (KRACK)NessusSuSE Local Security Checks
high
104961SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3154-1) (KRACK)NessusSuSE Local Security Checks
high
104960SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3153-1) (KRACK)NessusSuSE Local Security Checks
high
104959SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3152-1) (KRACK)NessusSuSE Local Security Checks
high
104958SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3151-1) (KRACK)NessusSuSE Local Security Checks
high
104957SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3150-1) (KRACK)NessusSuSE Local Security Checks
high
104956SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3149-1) (KRACK)NessusSuSE Local Security Checks
high
104955SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3148-1) (KRACK)NessusSuSE Local Security Checks
high
104954SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3147-1) (KRACK)NessusSuSE Local Security Checks
high
104953SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3146-1) (KRACK)NessusSuSE Local Security Checks
high
104952SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3145-1) (KRACK)NessusSuSE Local Security Checks
high
104880SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3132-1) (KRACK)NessusSuSE Local Security Checks
high
104879SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3131-1) (KRACK)NessusSuSE Local Security Checks
high
104878SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3130-1) (KRACK)NessusSuSE Local Security Checks
high
104877SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3127-1) (KRACK)NessusSuSE Local Security Checks
high
104876SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3125-1) (KRACK)NessusSuSE Local Security Checks
high
104875SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3124-1) (KRACK)NessusSuSE Local Security Checks
high
104874SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3123-1) (KRACK)NessusSuSE Local Security Checks
high
104873SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3119-1) (KRACK)NessusSuSE Local Security Checks
high
104872SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3118-1) (KRACK)NessusSuSE Local Security Checks
high
104871SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3117-1) (KRACK)NessusSuSE Local Security Checks
high
104805SUSE SLES12 Security Update : kernel (SUSE-SU-2017:3103-1) (KRACK)NessusSuSE Local Security Checks
high
104581Virtuozzo 7 : wpa_supplicant (VZLSA-2017-2907)NessusVirtuozzo Local Security Checks
high
104577EulerOS 2.0 SP2 : wpa_supplicant (EulerOS-SA-2017-1242)NessusHuawei Local Security Checks
high
104576EulerOS 2.0 SP1 : wpa_supplicant (EulerOS-SA-2017-1241)NessusHuawei Local Security Checks
high
104511GLSA-201711-03 : hostapd and wpa_supplicant: Key Reinstallation (KRACK) attacks (KRACK)NessusGentoo Local Security Checks
high
104387Apple TV < 11.1 Multiple VulnerabilitiesNessusMisc.
high
104384KB4042895: Windows 10 October 2017 Cumulative Update (KRACK)NessusWindows : Microsoft Bulletins
critical
104379macOS and Mac OS X Multiple Vulnerabilities (Security Update 2017-001 and 2017-004)NessusMacOS X Local Security Checks
critical
104378macOS 10.13.x < 10.13.1 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
high
104374SUSE SLES12 Security Update : kernel (SUSE-SU-2017:2920-1) (KRACK) (Stack Clash)NessusSuSE Local Security Checks
critical
104350Apple iOS < 11.1 Multiple VulnerabilitiesNessusMobile Devices
high
104299Debian DLA-1150-1 : wpa security update (KRACK)NessusDebian Local Security Checks
high
104271SUSE SLES12 Security Update : kernel (SUSE-SU-2017:2908-1) (KRACK) (Stack Clash)NessusSuSE Local Security Checks
critical
104253SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2017:2869-1) (KRACK)NessusSuSE Local Security Checks
high
104246openSUSE Security Update : the Linux Kernel (openSUSE-2017-1224) (KRACK)NessusSuSE Local Security Checks
high
104237openSUSE Security Update : hostapd (openSUSE-2017-1201) (KRACK)NessusSuSE Local Security Checks
high
104171SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2017:2847-1) (KRACK)NessusSuSE Local Security Checks
high
104166openSUSE Security Update : the Linux Kernel (openSUSE-2017-1194) (KRACK)NessusSuSE Local Security Checks
high
104076openSUSE Security Update : wpa_supplicant (openSUSE-2017-1163) (KRACK)NessusSuSE Local Security Checks
medium
103960Scientific Linux Security Update : wpa_supplicant on SL7.x x86_64 (20171018) (KRACK)NessusScientific Linux Local Security Checks
high
103959Scientific Linux Security Update : wpa_supplicant on SL6.x i386/x86_64 (20171018) (KRACK)NessusScientific Linux Local Security Checks
medium
103958RHEL 6 : wpa_supplicant (RHSA-2017:2911) (KRACK)NessusRed Hat Local Security Checks
medium
103955Oracle Linux 6 : wpa_supplicant (ELSA-2017-2911) (KRACK)NessusOracle Linux Local Security Checks
medium
103946CentOS 6 : wpa_supplicant (CESA-2017:2911) (KRACK)NessusCentOS Local Security Checks
medium
103944Slackware 14.0 / 14.1 / 14.2 / current : wpa_supplicant (SSA:2017-291-02) (KRACK)NessusSlackware Local Security Checks
high
103920SUSE SLES11 Security Update : wpa_supplicant (SUSE-SU-2017:2752-1) (KRACK)NessusSuSE Local Security Checks
medium
103917SUSE SLED12 / SLES12 Security Update : wpa_supplicant (SUSE-SU-2017:2745-1) (KRACK)NessusSuSE Local Security Checks
medium
103916RHEL 7 : wpa_supplicant (RHSA-2017:2907) (KRACK)NessusRed Hat Local Security Checks
high
103914Oracle Linux 7 : wpa_supplicant (ELSA-2017-2907) (KRACK)NessusOracle Linux Local Security Checks
high
103896Fedora 26 : 1:wpa_supplicant (2017-60bfb576b7) (KRACK)NessusFedora Local Security Checks
high
103884Fedora 25 : 1:wpa_supplicant (2017-12e76e8364) (KRACK)NessusFedora Local Security Checks
high
103881CentOS 7 : wpa_supplicant (CESA-2017:2907) (KRACK)NessusCentOS Local Security Checks
high
103875Ubiquiti Networks UniFi < 3.9.3.7537 (KRACK)NessusMisc.
high
103873Fortinet FortiGate < 5.2 / 5.2.x <= 5.2.11 / 5.4.x <= 5.4.5 / 5.6.x <= 5.6.2 Multiple Vulnerabilities (FG-IR-17-196) (KRACK)NessusFirewalls
medium
103870Intel Wireless Driver Wi-Fi Protected Access II (WPA2) Multiple Vulnerabilities (KRACK)NessusWindows
medium
103863Ubuntu 14.04 LTS / 16.04 LTS / 17.04 : wpa vulnerabilities (USN-3455-1) (KRACK)NessusUbuntu Local Security Checks
high
103862FreeBSD : WPA packet number reuse with replayed messages and key reinstallation (d670a953-b2a1-11e7-a633-009c02a2ab30) (KRACK)NessusFreeBSD Local Security Checks
high
103859Debian DSA-3999-1 : wpa - security update (KRACK)NessusDebian Local Security Checks
high
103857MikroTik RouterOS < 6.39.3 / 6.40.4 / 6.41rc (KRACK)NessusMisc.
high
103856Cisco ASA FirePOWER Services Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II (KRACK)NessusCISCO
high
103855ArubaOS WPA2 Key Reinstallation Vulnerabilities (KRACK)NessusMisc.
high
103816Windows 2008 October 2017 Multiple Security Updates (KRACK)NessusWindows : Microsoft Bulletins
critical
103750Windows 8.1 and Windows Server 2012 R2 October 2017 Security Updates (KRACK)NessusWindows : Microsoft Bulletins
critical
103749KB4041691: Windows 10 Version 1607 and Windows Server 2016 October 2017 Cumulative Update (KRACK)NessusWindows : Microsoft Bulletins
critical
103748Windows Server 2012 October 2017 Security Updates (KRACK)NessusWindows : Microsoft Bulletins
critical
103747KB4041689: Windows 10 Version 1511 October 2017 Cumulative Update (KRACK)NessusWindows : Microsoft Bulletins
critical
103746Windows 7 and Windows Server 2008 R2 October 2017 Security Updates (KRACK)NessusWindows : Microsoft Bulletins
critical
103745KB4041676: Windows 10 Version 1703 October 2017 Cumulative Update (KRACK)NessusWindows : Microsoft Bulletins
critical