CVE-2017-13081

Source
https://cve.org/CVERecord?id=CVE-2017-13081
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-13081.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2017-13081
Downstream
Related
Published
2017-10-17T13:29:00.443Z
Modified
2026-02-12T07:19:04.303632Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

References

Affected packages

Git / github.com/postfixadmin/postfixadmin

Affected ranges

Type
GIT
Repo
https://github.com/postfixadmin/postfixadmin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-13081.json"