Search criteria

402 vulnerabilities found for arubaos by arubanetworks

CVE-2025-37179 (GCVE-0-2025-37179)

Vulnerability from nvd – Published: 2026-01-13 20:08 – Updated: 2026-01-13 20:32
VLAI?
Title
Out-of-Bounds Read Vulnerabilities Leading to Process Crash in AOS-8 Operating System
Summary
Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process.
CWE
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
m0omo0d
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37179",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-13T20:32:05.666182Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-13T20:32:08.785Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "m0omo0d"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eMultiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process.\u003c/p\u003e"
            }
          ],
          "value": "Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:09:04.553Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Out-of-Bounds Read Vulnerabilities Leading to Process Crash in AOS-8 Operating System",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37179",
    "datePublished": "2026-01-13T20:08:58.718Z",
    "dateReserved": "2025-04-16T01:28:25.379Z",
    "dateUpdated": "2026-01-13T20:32:08.785Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37178 (GCVE-0-2025-37178)

Vulnerability from nvd – Published: 2026-01-13 20:08 – Updated: 2026-01-13 20:46
VLAI?
Title
Out-of-Bounds Read Vulnerabilities Leading to Process Crash in AOS-8 Operating System
Summary
Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process.
CWE
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
n3k
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37178",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-13T20:46:29.652570Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-13T20:46:35.369Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "n3k"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eMultiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process.\u003c/p\u003e"
            }
          ],
          "value": "Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:08:23.659Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Out-of-Bounds Read Vulnerabilities Leading to Process Crash in AOS-8 Operating System",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37178",
    "datePublished": "2026-01-13T20:08:23.659Z",
    "dateReserved": "2025-04-16T01:28:25.379Z",
    "dateUpdated": "2026-01-13T20:46:35.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37177 (GCVE-0-2025-37177)

Vulnerability from nvd – Published: 2026-01-13 20:08 – Updated: 2026-01-13 20:54
VLAI?
Title
Authenticated Arbitrary File Deletion Vulnerability in AOS-10 or AOS-8 Command Line Interface (CLI)
Summary
An arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation of this vulnerability could allow an authenticated remote malicious actor to delete arbitrary files within the affected system.
CWE
  • CWE-552 - Files or Directories Accessible to External Parties
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.6.0.0 , ≤ 10.7.2.1 (semver)
Affected: 10.3.0.0 , ≤ 10.4.1.9 (semver)
Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
LIUPENG
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37177",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-13T20:54:11.185125Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-552",
                "description": "CWE-552 Files or Directories Accessible to External Parties",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-13T20:54:14.563Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.2.1",
              "status": "affected",
              "version": "10.6.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.9",
              "status": "affected",
              "version": "10.3.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "LIUPENG"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAn arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation of this vulnerability could allow an authenticated remote malicious actor to delete arbitrary files within the affected system.\u003c/p\u003e"
            }
          ],
          "value": "An arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation of this vulnerability could allow an authenticated remote malicious actor to delete arbitrary files within the affected system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:08:06.545Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Arbitrary File Deletion Vulnerability in AOS-10 or AOS-8 Command Line Interface (CLI)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37177",
    "datePublished": "2026-01-13T20:08:06.545Z",
    "dateReserved": "2025-04-16T01:28:25.379Z",
    "dateUpdated": "2026-01-13T20:54:14.563Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37176 (GCVE-0-2025-37176)

Vulnerability from nvd – Published: 2026-01-13 20:07 – Updated: 2026-01-14 04:57
VLAI?
Title
Authenticated Command Injection Vulnerability in an AOS-8 operating system's internal workflow
Summary
A command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a package header to inject shell commands, potentially affecting the execution of internal operations. Successful exploit could allow an authenticated malicious actor to execute commands with the privileges of the impacted mechanism.
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
Erik de Jong
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37176",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-13T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-77",
                "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T04:57:49.721Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Erik de Jong"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a package header to inject shell commands, potentially affecting the execution of internal operations. Successful exploit could allow an authenticated malicious actor to execute commands with the privileges of the impacted mechanism.\u003c/p\u003e"
            }
          ],
          "value": "A command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a package header to inject shell commands, potentially affecting the execution of internal operations. Successful exploit could allow an authenticated malicious actor to execute commands with the privileges of the impacted mechanism."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:07:50.236Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Command Injection Vulnerability in an AOS-8 operating system\u0027s internal workflow",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37176",
    "datePublished": "2026-01-13T20:07:50.236Z",
    "dateReserved": "2025-04-16T01:28:25.378Z",
    "dateUpdated": "2026-01-14T04:57:49.721Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37175 (GCVE-0-2025-37175)

Vulnerability from nvd – Published: 2026-01-13 20:07 – Updated: 2026-01-14 15:15
VLAI?
Title
Authenticated Arbitrary File Upload Vulnerability in AOS-10 or AOS-8 Web-Based Management Interface
Summary
Arbitrary file upload vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files as a privilege user and execute arbitrary commands on the underlying operating system.
CWE
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.6.0.0 , ≤ 10.7.2.1 (semver)
Affected: 10.3.0.0 , ≤ 10.4.1.9 (semver)
Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37175",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:49.451219Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-434",
                "description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:15:11.658Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.2.1",
              "status": "affected",
              "version": "10.6.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.9",
              "status": "affected",
              "version": "10.3.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eArbitrary file upload vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files as a privilege user and execute arbitrary commands on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "Arbitrary file upload vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files as a privilege user and execute arbitrary commands on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:07:34.158Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Arbitrary File Upload Vulnerability in AOS-10 or AOS-8 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37175",
    "datePublished": "2026-01-13T20:07:34.158Z",
    "dateReserved": "2025-04-16T01:28:25.378Z",
    "dateUpdated": "2026-01-14T15:15:11.658Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37174 (GCVE-0-2025-37174)

Vulnerability from nvd – Published: 2026-01-13 20:05 – Updated: 2026-01-14 15:14
VLAI?
Title
Authenticated Arbitrary File Write Vulnerability in AOS 10 and AOS-8 Web-Based Management Interface
Summary
Authenticated arbitrary file write vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to create or modify arbitrary files and execute arbitrary commands as a privileged user on the underlying operating system.
CWE
  • CWE-277 - Insecure Inherited Permissions
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.6.0.0 , ≤ 10.7.2.1 (semver)
Affected: 10.3.0.0 , ≤ 10.4.1.9 (semver)
Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37174",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:48.402437Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-277",
                "description": "CWE-277 Insecure Inherited Permissions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:14:30.866Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.2.1",
              "status": "affected",
              "version": "10.6.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.9",
              "status": "affected",
              "version": "10.3.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAuthenticated arbitrary file write vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to create or modify arbitrary files and execute arbitrary commands as a privileged user on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "Authenticated arbitrary file write vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to create or modify arbitrary files and execute arbitrary commands as a privileged user on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:05:33.134Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Arbitrary File Write Vulnerability in AOS 10 and AOS-8 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37174",
    "datePublished": "2026-01-13T20:05:33.134Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T15:14:30.866Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37173 (GCVE-0-2025-37173)

Vulnerability from nvd – Published: 2026-01-13 20:04 – Updated: 2026-01-14 15:12
VLAI?
Title
Improper Input Handling Vulnerability in Authenticated Configuration API Endpoint (AOS-10/AOS-8 Web UI)
Summary
An improper input handling vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor with valid credentials to trigger unintended behavior on the affected system.
CWE
  • CWE-20 - Improper Input Validation
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.6.0.0 , ≤ 10.7.2.1 (semver)
Affected: 10.3.0.0 , ≤ 10.4.1.9 (semver)
Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
moonv
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37173",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:47.388980Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:12:36.694Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.2.1",
              "status": "affected",
              "version": "10.6.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.9",
              "status": "affected",
              "version": "10.3.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "moonv"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAn improper input handling vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor with valid credentials to trigger unintended behavior on the affected system.\u003c/p\u003e"
            }
          ],
          "value": "An improper input handling vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor with valid credentials to trigger unintended behavior on the affected system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:07:08.726Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Improper Input Handling Vulnerability in Authenticated Configuration API Endpoint (AOS-10/AOS-8 Web UI)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37173",
    "datePublished": "2026-01-13T20:04:57.366Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T15:12:36.694Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37172 (GCVE-0-2025-37172)

Vulnerability from nvd – Published: 2026-01-13 20:04 – Updated: 2026-01-14 15:11
VLAI?
Title
Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface
Summary
Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37172",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:46.381622Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-78",
                "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:11:50.406Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAuthenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:06:55.936Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37172",
    "datePublished": "2026-01-13T20:04:38.071Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T15:11:50.406Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37171 (GCVE-0-2025-37171)

Vulnerability from nvd – Published: 2026-01-13 20:04 – Updated: 2026-01-14 15:11
VLAI?
Title
Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface
Summary
Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37171",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:44.404702Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-78",
                "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:11:30.971Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAuthenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:06:43.748Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37171",
    "datePublished": "2026-01-13T20:04:22.468Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T15:11:30.971Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37170 (GCVE-0-2025-37170)

Vulnerability from nvd – Published: 2026-01-13 20:04 – Updated: 2026-01-14 15:11
VLAI?
Title
Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface
Summary
Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37170",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:43.411367Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-78",
                "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:11:05.856Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAuthenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:06:31.238Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37170",
    "datePublished": "2026-01-13T20:04:03.744Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T15:11:05.856Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37169 (GCVE-0-2025-37169)

Vulnerability from nvd – Published: 2026-01-13 20:03 – Updated: 2026-01-14 04:57
VLAI?
Title
Stack Overflow Vulnerability in AOS-10 Web-Based Management Interface
Summary
A stack overflow vulnerability exists in the AOS-10 web-based management interface of a Mobility Gateway. Successful exploitation could allow an authenticated malicious actor to execute arbitrary code as a privileged user on the underlying operating system.
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.6.0.0 , ≤ 10.7.2.1 (semver)
Affected: 10.3.0.0 , ≤ 10.4.1.9 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37169",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-13T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T04:57:40.730Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.2.1",
              "status": "affected",
              "version": "10.6.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.9",
              "status": "affected",
              "version": "10.3.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA stack overflow vulnerability exists in the AOS-10 web-based management interface of a Mobility Gateway. Successful exploitation could allow an authenticated malicious actor to execute arbitrary code as a privileged user on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "A stack overflow vulnerability exists in the AOS-10 web-based management interface of a Mobility Gateway. Successful exploitation could allow an authenticated malicious actor to execute arbitrary code as a privileged user on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:06:18.141Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Stack Overflow Vulnerability in AOS-10 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37169",
    "datePublished": "2026-01-13T20:03:33.822Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T04:57:40.730Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37168 (GCVE-0-2025-37168)

Vulnerability from nvd – Published: 2026-01-13 20:03 – Updated: 2026-01-14 18:56
VLAI?
Title
Unauthenticated Arbitrary File Deletion Vulnerability in AOS-8 Operating System
Summary
Arbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affected devices.
CWE
  • CWE-552 - Files or Directories Accessible to External Parties
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
n3k
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37168",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T18:56:22.109923Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-552",
                "description": "CWE-552 Files or Directories Accessible to External Parties",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T18:56:26.327Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "n3k"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eArbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affected devices.\u003c/p\u003e"
            }
          ],
          "value": "Arbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affected devices."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:06:04.088Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Unauthenticated Arbitrary File Deletion Vulnerability in AOS-8 Operating System",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37168",
    "datePublished": "2026-01-13T20:03:08.524Z",
    "dateReserved": "2025-04-16T01:28:25.375Z",
    "dateUpdated": "2026-01-14T18:56:26.327Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37145 (GCVE-0-2025-37145)

Vulnerability from nvd – Published: 2025-10-14 17:02 – Updated: 2025-10-15 13:26
VLAI?
Title
Authenticated Arbitrary File Download Vulnerabilities in a Low-Level Interface Library Affecting AOS-10 GW and AOS-8 Controller/Mobility Conductor Web-Based Management Interface
Summary
Arbitrary file download vulnerabilities exist in a low-level interface library in AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.7.0.0 , ≤ 10.7.1.1 (semver)
Affected: 10.4.0.0 , ≤ 10.4.1.8 (semver)
Affected: 8.13.0.0 , ≤ 8.13.0.1 (semver)
Affected: 8.12.0.0 , ≤ 8.12.0.5 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.18 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37145",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-15T13:26:17.654608Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-22",
                "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-15T13:26:22.396Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.1.1",
              "status": "affected",
              "version": "10.7.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.8",
              "status": "affected",
              "version": "10.4.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.13.0.1",
              "status": "affected",
              "version": "8.13.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.12.0.5",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.18",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eArbitrary file download vulnerabilities exist in a low-level interface library in AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits.\u003c/p\u003e"
            }
          ],
          "value": "Arbitrary file download vulnerabilities exist in a low-level interface library in AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-14T17:02:25.602Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04957en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04957",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Arbitrary File Download Vulnerabilities in a Low-Level Interface Library Affecting AOS-10 GW and AOS-8 Controller/Mobility Conductor Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37145",
    "datePublished": "2025-10-14T17:02:25.602Z",
    "dateReserved": "2025-04-16T01:28:25.368Z",
    "dateUpdated": "2025-10-15T13:26:22.396Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-37179 (GCVE-0-2025-37179)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:08 – Updated: 2026-01-13 20:32
VLAI?
Title
Out-of-Bounds Read Vulnerabilities Leading to Process Crash in AOS-8 Operating System
Summary
Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process.
CWE
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
m0omo0d
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37179",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-13T20:32:05.666182Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-13T20:32:08.785Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "m0omo0d"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eMultiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process.\u003c/p\u003e"
            }
          ],
          "value": "Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:09:04.553Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Out-of-Bounds Read Vulnerabilities Leading to Process Crash in AOS-8 Operating System",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37179",
    "datePublished": "2026-01-13T20:08:58.718Z",
    "dateReserved": "2025-04-16T01:28:25.379Z",
    "dateUpdated": "2026-01-13T20:32:08.785Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37178 (GCVE-0-2025-37178)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:08 – Updated: 2026-01-13 20:46
VLAI?
Title
Out-of-Bounds Read Vulnerabilities Leading to Process Crash in AOS-8 Operating System
Summary
Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process.
CWE
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
n3k
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37178",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-13T20:46:29.652570Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-13T20:46:35.369Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "n3k"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eMultiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process.\u003c/p\u003e"
            }
          ],
          "value": "Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential denial-of-service of the compromised process."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:08:23.659Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Out-of-Bounds Read Vulnerabilities Leading to Process Crash in AOS-8 Operating System",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37178",
    "datePublished": "2026-01-13T20:08:23.659Z",
    "dateReserved": "2025-04-16T01:28:25.379Z",
    "dateUpdated": "2026-01-13T20:46:35.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37177 (GCVE-0-2025-37177)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:08 – Updated: 2026-01-13 20:54
VLAI?
Title
Authenticated Arbitrary File Deletion Vulnerability in AOS-10 or AOS-8 Command Line Interface (CLI)
Summary
An arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation of this vulnerability could allow an authenticated remote malicious actor to delete arbitrary files within the affected system.
CWE
  • CWE-552 - Files or Directories Accessible to External Parties
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.6.0.0 , ≤ 10.7.2.1 (semver)
Affected: 10.3.0.0 , ≤ 10.4.1.9 (semver)
Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
LIUPENG
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37177",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-13T20:54:11.185125Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-552",
                "description": "CWE-552 Files or Directories Accessible to External Parties",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-13T20:54:14.563Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.2.1",
              "status": "affected",
              "version": "10.6.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.9",
              "status": "affected",
              "version": "10.3.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "LIUPENG"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAn arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation of this vulnerability could allow an authenticated remote malicious actor to delete arbitrary files within the affected system.\u003c/p\u003e"
            }
          ],
          "value": "An arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation of this vulnerability could allow an authenticated remote malicious actor to delete arbitrary files within the affected system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:08:06.545Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Arbitrary File Deletion Vulnerability in AOS-10 or AOS-8 Command Line Interface (CLI)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37177",
    "datePublished": "2026-01-13T20:08:06.545Z",
    "dateReserved": "2025-04-16T01:28:25.379Z",
    "dateUpdated": "2026-01-13T20:54:14.563Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37176 (GCVE-0-2025-37176)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:07 – Updated: 2026-01-14 04:57
VLAI?
Title
Authenticated Command Injection Vulnerability in an AOS-8 operating system's internal workflow
Summary
A command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a package header to inject shell commands, potentially affecting the execution of internal operations. Successful exploit could allow an authenticated malicious actor to execute commands with the privileges of the impacted mechanism.
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
Erik de Jong
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37176",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-13T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-77",
                "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T04:57:49.721Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Erik de Jong"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a package header to inject shell commands, potentially affecting the execution of internal operations. Successful exploit could allow an authenticated malicious actor to execute commands with the privileges of the impacted mechanism.\u003c/p\u003e"
            }
          ],
          "value": "A command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a package header to inject shell commands, potentially affecting the execution of internal operations. Successful exploit could allow an authenticated malicious actor to execute commands with the privileges of the impacted mechanism."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:07:50.236Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Command Injection Vulnerability in an AOS-8 operating system\u0027s internal workflow",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37176",
    "datePublished": "2026-01-13T20:07:50.236Z",
    "dateReserved": "2025-04-16T01:28:25.378Z",
    "dateUpdated": "2026-01-14T04:57:49.721Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37175 (GCVE-0-2025-37175)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:07 – Updated: 2026-01-14 15:15
VLAI?
Title
Authenticated Arbitrary File Upload Vulnerability in AOS-10 or AOS-8 Web-Based Management Interface
Summary
Arbitrary file upload vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files as a privilege user and execute arbitrary commands on the underlying operating system.
CWE
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.6.0.0 , ≤ 10.7.2.1 (semver)
Affected: 10.3.0.0 , ≤ 10.4.1.9 (semver)
Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37175",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:49.451219Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-434",
                "description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:15:11.658Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.2.1",
              "status": "affected",
              "version": "10.6.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.9",
              "status": "affected",
              "version": "10.3.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eArbitrary file upload vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files as a privilege user and execute arbitrary commands on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "Arbitrary file upload vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files as a privilege user and execute arbitrary commands on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:07:34.158Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Arbitrary File Upload Vulnerability in AOS-10 or AOS-8 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37175",
    "datePublished": "2026-01-13T20:07:34.158Z",
    "dateReserved": "2025-04-16T01:28:25.378Z",
    "dateUpdated": "2026-01-14T15:15:11.658Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37174 (GCVE-0-2025-37174)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:05 – Updated: 2026-01-14 15:14
VLAI?
Title
Authenticated Arbitrary File Write Vulnerability in AOS 10 and AOS-8 Web-Based Management Interface
Summary
Authenticated arbitrary file write vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to create or modify arbitrary files and execute arbitrary commands as a privileged user on the underlying operating system.
CWE
  • CWE-277 - Insecure Inherited Permissions
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.6.0.0 , ≤ 10.7.2.1 (semver)
Affected: 10.3.0.0 , ≤ 10.4.1.9 (semver)
Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37174",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:48.402437Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-277",
                "description": "CWE-277 Insecure Inherited Permissions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:14:30.866Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.2.1",
              "status": "affected",
              "version": "10.6.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.9",
              "status": "affected",
              "version": "10.3.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAuthenticated arbitrary file write vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to create or modify arbitrary files and execute arbitrary commands as a privileged user on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "Authenticated arbitrary file write vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to create or modify arbitrary files and execute arbitrary commands as a privileged user on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:05:33.134Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Arbitrary File Write Vulnerability in AOS 10 and AOS-8 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37174",
    "datePublished": "2026-01-13T20:05:33.134Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T15:14:30.866Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37173 (GCVE-0-2025-37173)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:04 – Updated: 2026-01-14 15:12
VLAI?
Title
Improper Input Handling Vulnerability in Authenticated Configuration API Endpoint (AOS-10/AOS-8 Web UI)
Summary
An improper input handling vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor with valid credentials to trigger unintended behavior on the affected system.
CWE
  • CWE-20 - Improper Input Validation
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.6.0.0 , ≤ 10.7.2.1 (semver)
Affected: 10.3.0.0 , ≤ 10.4.1.9 (semver)
Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
moonv
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37173",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:47.388980Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:12:36.694Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.2.1",
              "status": "affected",
              "version": "10.6.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.9",
              "status": "affected",
              "version": "10.3.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "moonv"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAn improper input handling vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor with valid credentials to trigger unintended behavior on the affected system.\u003c/p\u003e"
            }
          ],
          "value": "An improper input handling vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor with valid credentials to trigger unintended behavior on the affected system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:07:08.726Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Improper Input Handling Vulnerability in Authenticated Configuration API Endpoint (AOS-10/AOS-8 Web UI)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37173",
    "datePublished": "2026-01-13T20:04:57.366Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T15:12:36.694Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37172 (GCVE-0-2025-37172)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:04 – Updated: 2026-01-14 15:11
VLAI?
Title
Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface
Summary
Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37172",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:46.381622Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-78",
                "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:11:50.406Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAuthenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:06:55.936Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37172",
    "datePublished": "2026-01-13T20:04:38.071Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T15:11:50.406Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37171 (GCVE-0-2025-37171)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:04 – Updated: 2026-01-14 15:11
VLAI?
Title
Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface
Summary
Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37171",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:44.404702Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-78",
                "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:11:30.971Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAuthenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:06:43.748Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37171",
    "datePublished": "2026-01-13T20:04:22.468Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T15:11:30.971Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37170 (GCVE-0-2025-37170)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:04 – Updated: 2026-01-14 15:11
VLAI?
Title
Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface
Summary
Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37170",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:43.411367Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-78",
                "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T15:11:05.856Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAuthenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:06:31.238Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Authenticated Command Injection Vulnerabilities in AOS-8 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37170",
    "datePublished": "2026-01-13T20:04:03.744Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T15:11:05.856Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37169 (GCVE-0-2025-37169)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:03 – Updated: 2026-01-14 04:57
VLAI?
Title
Stack Overflow Vulnerability in AOS-10 Web-Based Management Interface
Summary
A stack overflow vulnerability exists in the AOS-10 web-based management interface of a Mobility Gateway. Successful exploitation could allow an authenticated malicious actor to execute arbitrary code as a privileged user on the underlying operating system.
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 10.6.0.0 , ≤ 10.7.2.1 (semver)
Affected: 10.3.0.0 , ≤ 10.4.1.9 (semver)
Create a notification for this product.
Credits
zzcentury from Ubisectech Sirius Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37169",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-13T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T04:57:40.730Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "10.7.2.1",
              "status": "affected",
              "version": "10.6.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "10.4.1.9",
              "status": "affected",
              "version": "10.3.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "zzcentury from Ubisectech Sirius Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA stack overflow vulnerability exists in the AOS-10 web-based management interface of a Mobility Gateway. Successful exploitation could allow an authenticated malicious actor to execute arbitrary code as a privileged user on the underlying operating system.\u003c/p\u003e"
            }
          ],
          "value": "A stack overflow vulnerability exists in the AOS-10 web-based management interface of a Mobility Gateway. Successful exploitation could allow an authenticated malicious actor to execute arbitrary code as a privileged user on the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:06:18.141Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Stack Overflow Vulnerability in AOS-10 Web-Based Management Interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37169",
    "datePublished": "2026-01-13T20:03:33.822Z",
    "dateReserved": "2025-04-16T01:28:25.376Z",
    "dateUpdated": "2026-01-14T04:57:40.730Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37168 (GCVE-0-2025-37168)

Vulnerability from cvelistv5 – Published: 2026-01-13 20:03 – Updated: 2026-01-14 18:56
VLAI?
Title
Unauthenticated Arbitrary File Deletion Vulnerability in AOS-8 Operating System
Summary
Arbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affected devices.
CWE
  • CWE-552 - Files or Directories Accessible to External Parties
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) ArubaOS (AOS) Affected: 8.12.0.0 , ≤ 8.13.1.0 (semver)
Affected: 8.10.0.0 , ≤ 8.10.0.20 (semver)
Create a notification for this product.
Credits
n3k
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37168",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T18:56:22.109923Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-552",
                "description": "CWE-552 Files or Directories Accessible to External Parties",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T18:56:26.327Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "ArubaOS (AOS)",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThanOrEqual": "8.13.1.0",
              "status": "affected",
              "version": "8.12.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0.20",
              "status": "affected",
              "version": "8.10.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "n3k"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eArbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affected devices.\u003c/p\u003e"
            }
          ],
          "value": "Arbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affected devices."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T20:06:04.088Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us\u0026docLocale=en_US"
        }
      ],
      "source": {
        "advisory": "HPESBNW04987",
        "discovery": "INTERNAL"
      },
      "title": "Unauthenticated Arbitrary File Deletion Vulnerability in AOS-8 Operating System",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2025-37168",
    "datePublished": "2026-01-13T20:03:08.524Z",
    "dateReserved": "2025-04-16T01:28:25.375Z",
    "dateUpdated": "2026-01-14T18:56:26.327Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

VAR-201710-0206

Vulnerability from variot - Updated: 2025-12-22 23:41

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or "KRACK" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). The WPA2 wireless network has a PTK-TK key reload vulnerability in the fourth handshake. WPA2 is prone to multiple security weaknesses. Exploiting these issues may allow an unauthorized user to intercept and manipulate data or disclose sensitive information. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: wpa_supplicant security update Advisory ID: RHSA-2017:2907-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2907 Issue date: 2017-10-17 CVE Names: CVE-2017-13077 CVE-2017-13078 CVE-2017-13080 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 =====================================================================

  1. Summary:

An update for wpa_supplicant is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64

  1. Description:

The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)

Red Hat would like to thank CERT for reporting these issues. Upstream acknowledges Mathy Vanhoef (University of Leuven) as the original reporter of these issues. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1491692 - CVE-2017-13077 wpa_supplicant: Reinstallation of the pairwise key in the 4-way handshake 1491693 - CVE-2017-13078 wpa_supplicant: Reinstallation of the group key in the 4-way handshake 1491696 - CVE-2017-13080 wpa_supplicant: Reinstallation of the group key in the group key handshake 1491698 - CVE-2017-13082 wpa_supplicant: Accepting a retransmitted FT Reassociation Request and reinstalling the pairwise key while processing it 1500302 - CVE-2017-13086 wpa_supplicant: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake 1500303 - CVE-2017-13087 wpa_supplicant: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame 1500304 - CVE-2017-13088 wpa_supplicant: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

aarch64: wpa_supplicant-2.6-5.el7_4.1.aarch64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.aarch64.rpm

ppc64: wpa_supplicant-2.6-5.el7_4.1.ppc64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64.rpm

ppc64le: wpa_supplicant-2.6-5.el7_4.1.ppc64le.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64le.rpm

s390x: wpa_supplicant-2.6-5.el7_4.1.s390x.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.s390x.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2017-13077 https://access.redhat.com/security/cve/CVE-2017-13078 https://access.redhat.com/security/cve/CVE-2017-13080 https://access.redhat.com/security/cve/CVE-2017-13082 https://access.redhat.com/security/cve/CVE-2017-13086 https://access.redhat.com/security/cve/CVE-2017-13087 https://access.redhat.com/security/cve/CVE-2017-13088 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/kracks

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

APPLE-SA-2017-12-12-2 AirPort Base Station Firmware Update 7.7.9

AirPort Base Station Firmware Update 7.7.9 is now available and addresses the following:

AirPort Base Station Firmware Available for: AirPort Extreme and AirPort Time Capsule base stations with 802.11ac Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-9417: Nitay Artenstein of Exodus Intelligence

AirPort Base Station Firmware Available for: AirPort Extreme and AirPort Time Capsule base stations with 802.11ac Impact: An attacker in Wi-Fi range may force nonce reuse in WPA unicast/PTK clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management. CVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at KU Leuven CVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at KU Leuven

AirPort Base Station Firmware Available for: AirPort Extreme and AirPort Time Capsule base stations with 802.11ac Impact: An attacker in Wi-Fi range may force nonce reuse in WPA multicast/GTK clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management. CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven

Installation note:

Firmware version 7.7.9 is installed on AirPort Extreme or AirPort Time Capsule base stations with 802.11ac using AirPort Utility for Mac or iOS.

AirPort Utility for Mac is a free download from https://support.apple.com/downloads/ and AirPort Utility for iOS is a free download from the App Store. CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven

Installation note:

Wi-Fi Update for Boot Camp 6.4.0 may be obtained from Apple Software Update for Windows. Those vulnerabilities applies to both the access point (implemented in hostapd) and the station (implemented in wpa_supplicant).

An attacker exploiting the vulnerabilities could force the vulnerable system to reuse cryptographic session keys, enabling a range of cryptographic attacks against the ciphers used in WPA1 and WPA2.

For the stable distribution (stretch), these problems have been fixed in version 2:2.4-1+deb9u1.

For the testing distribution (buster), these problems have been fixed in version 2:2.4-1.1.

For the unstable distribution (sid), these problems have been fixed in version 2:2.4-1.1.

We recommend that you upgrade your wpa packages. ========================================================================== Ubuntu Security Notice USN-3455-1 October 16, 2017

wpa vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in wpa_supplicant.

Software Description: - wpa: client support for WPA and WPA2

Details:

Mathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly handled WPA2. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)

Imre Rad discovered that wpa_supplicant and hostapd incorrectly handled invalid characters in passphrase parameters. A remote attacker could use this issue to cause a denial of service. (CVE-2016-4476)

Imre Rad discovered that wpa_supplicant and hostapd incorrectly handled invalid characters in passphrase parameters. A local attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. (CVE-2016-4477)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.04: hostapd 2.4-0ubuntu9.1 wpasupplicant 2.4-0ubuntu9.1

Ubuntu 16.04 LTS: hostapd 2.4-0ubuntu6.2 wpasupplicant 2.4-0ubuntu6.2

Ubuntu 14.04 LTS: hostapd 2.1-0ubuntu1.5 wpasupplicant 2.1-0ubuntu1.5

After a standard system update you need to reboot your computer to make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201711-03


                                       https://security.gentoo.org/

Severity: Normal Title: hostapd and wpa_supplicant: Key Reinstallation (KRACK) attacks Date: November 10, 2017 Bugs: #634436, #634438 ID: 201711-03


Synopsis

A flaw was discovered in the 4-way handshake in hostapd and wpa_supplicant that allows attackers to conduct a Man in the Middle attack.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 net-wireless/hostapd < 2.6-r1 >= 2.6-r1 2 net-wireless/wpa_supplicant < 2.6-r3 >= 2.6-r3 ------------------------------------------------------------------- 2 affected packages

Description

WiFi Protected Access (WPA and WPA2) and it's associated technologies are all vulnerable to the KRACK attacks. Please review the referenced CVE identifiers for details.

Impact

An attacker can carry out the KRACK attacks on a wireless network in order to gain access to network clients. Once achieved, the attacker can potentially harvest confidential information (e.g. HTTP/HTTPS), inject malware, or perform a myriad of other attacks.

Workaround

There is no known workaround at this time.

Resolution

All hostapd users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.6-r1"

All wpa_supplicant users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot -v ">=net-wireless/wpa_supplicant-2.6-r3"

References

[ 1 ] CVE-2017-13077 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13077 [ 2 ] CVE-2017-13078 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13078 [ 3 ] CVE-2017-13079 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13079 [ 4 ] CVE-2017-13080 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

============================================================================= FreeBSD-SA-17:07.wpa Security Advisory The FreeBSD Project

Topic: WPA2 protocol vulnerability

Category: contrib Module: wpa Announced: 2017-10-16 Credits: Mathy Vanhoef Affects: All supported versions of FreeBSD. Corrected: 2017-10-17 17:30:18 UTC (stable/11, 11.1-STABLE) 2017-10-17 17:57:18 UTC (releng/11.1, 11.1-RELEASE-p2) 2017-10-17 17:56:03 UTC (releng/11.0, 11.0-RELEASE-p13) 2017-10-19 03:18:22 UTC (stable/10, 10.4-STABLE) 2017-10-19 03:20:17 UTC (releng/10.4, 10.4-RELEASE-p1) 2017-10-19 03:19:42 UTC (releng/10.3, 10.3-RELEASE-p22) CVE Name: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .

  1. Revision history

v1.0 2017-10-17 Initial release. v1.1 2017-10-19 Add patches for 10.x releases.

I.

hostapd and wpa_supplicant are implementations of user space daemon for access points and wireless client that implements the WPA2 protocol.

II. Problem Description

A vulnerability was found in how a number of implementations can be triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by replaying a specific frame that is used to manage the keys.

III. Impact

Such reinstallation of the encryption key can result in two different types of vulnerabilities: disabling replay protection and significantly reducing the security of encryption to the point of allowing frames to be decrypted or some parts of the keys to be determined by an attacker depending on which cipher is used.

IV. Workaround

An updated version of wpa_supplicant is available in the FreeBSD Ports Collection. Install version 2.6_2 or later of the security/wpa_supplicant port/pkg. Once installed, update /etc/rc.conf to use the new binary:

wpa_supplicant_program="/usr/local/sbin/wpa_supplicant"

and restart networking.

An updated version of hostapd is available in the FreeBSD Ports Collection. Install version 2.6_1 or later of the net/hostapd port/pkg. Once installed, update /etc/rc.conf to use the new binary:

hostapd_program="/usr/local/sbin/hostapd"

and restart hostapd.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

Restart the Wi-Fi network interfaces/hostapd or reboot the system.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

Restart the Wi-Fi network interfaces/hostapd or reboot the system.

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 11.0-RELEASE, 11.1-RELEASE, and 11-STABLE]

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch.asc

gpg --verify wpa-11.patch.asc

[FreeBSD 10.3-RELEASE, 10.4-RELEASE, and 10-STABLE]

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch.asc

gpg --verify wpa-10.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart the applicable daemons, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/11/ r324697 releng/11.0/ r324698 releng/11.1/ r324699 stable/10/ r324739 releng/10.3/ r324740 releng/10.4/ r324741


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEEHPf/b631yp++G4yy7Wfs1l3PaucFAlnoGpNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDFD RjdGRjZGQURGNUNBOUZCRTFCOENCMkVENjdFQ0Q2NURDRjZBRTcACgkQ7Wfs1l3P auc7WBAAm27w+fujv5sJsRxauUMopTVtRh5utwbDuoHTP+L+RCWmQfVBmueNQ0gf uJzMNxBIkbtY9LvyukpRsH3iD7mh26c0pd9rxxkkr4F96C9B5+W0amxJF1gdm54/ F/50FpY+lo7cNs5tiBjypPrg8UOBBI/1G4XR7130XC0HjaTwt1ngZ0oQUWUMSsIp gN5ZfPul81WPWd1NqF+vyObcJhwq/Y1uoexoO27o7GQCFZoL3enZy8c4f1xqMlVM 4HHkTgNGac6E0aW+ArH4J0DFFAOJXPqF8rdt+9XINfoBbtliIyOixJ4oh1n6eAR0 VpBWZKFNyXSlUKIvDGa+LDhxgL1jJXV0ABSyKlUOijdmr3bbbiQE9MW/MNv2AFTd OAFQ0QQtm9KCWp5JLh+FPIb/kR2l7MOUP+yz4zFcJpdGtl9tDLyPN8vRTq60bY8O y7tBcf/SMqkd/AIFdchL4zrOguKnRARydIlwTarp8wtAQI3MKSsa1B0wgsDtlL6K xfdjnwWMKvKKlNOW16e1WXXO0n/ucHV4njBE+bGPro3jLgXP2/WFZpIGAR3I4xrr SdD4AxSNiR9f3bL7LRfMIbugJAylWNSlTLWUOVUv0/ONh85LqbcCj13NI230B64K ETx2QOZgKnCs2oDNiw4aQHb7kvi2w94Iw/R1sAPkkxYJWO3reyE= =h/5q -----END PGP SIGNATURE----- .

Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz: Upgraded. This update includes patches to mitigate the WPA2 protocol issues known as "KRACK" (Key Reinstallation AttaCK), which may be used to decrypt data, hijack TCP connections, and to forge and inject packets. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. For more information, see: https://www.krackattacks.com/ https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088 ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz

Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz

Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz

MD5 signatures: +-------------+

Slackware 14.0 package: d8ecfaadb50b3547967ab53733ffc019 wpa_supplicant-2.6-i486-1_slack14.0.txz

Slackware x86_64 14.0 package: f25216d28800504ce498705da7c9a825 wpa_supplicant-2.6-x86_64-1_slack14.0.txz

Slackware 14.1 package: 15c61050e4bab2581757befd86be74c0 wpa_supplicant-2.6-i486-1_slack14.1.txz

Slackware x86_64 14.1 package: 49fd537a520338744f7757615556d352 wpa_supplicant-2.6-x86_64-1_slack14.1.txz

Slackware 14.2 package: c5539f40c8510af89be92945f0f80185 wpa_supplicant-2.6-i586-1_slack14.2.txz

Slackware x86_64 14.2 package: 4c527ff84fcdfd7839f217bbce2e4ae4 wpa_supplicant-2.6-x86_64-1_slack14.2.txz

Slackware -current package: 28bd88a54e96368f7a7020c1f5fb67fe n/wpa_supplicant-2.6-i586-2.txz

Slackware x86_64 -current package: 464fc6b48d1ac077f47e9a3a8534c160 n/wpa_supplicant-2.6-x86_64-2.txz

Installation instructions: +------------------------+

Upgrade the package as root:

upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0206",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "linux enterprise point of sale",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "openstack cloud",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "6"
      },
      {
        "model": "linux enterprise desktop",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.5"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.9"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "14.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.5"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "*"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.6"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "10"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.10"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.2"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.6"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.5"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.4"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.8"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.1"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.10"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.7.3"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.0"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.4"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.8"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.6"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.7.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "11.1"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.0"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.6"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.4"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.1"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.8"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "42.2"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.7"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "17.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.4"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "10.4"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.10"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.1"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.5"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.3"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.11"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.2"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.8"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "11"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.8"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "42.3"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "9front",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "adtran",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "avm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "actiontec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "aerohive",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "android open source",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "arch linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "aruba",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "asustek computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "barracuda",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cambium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "centos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cradlepoint",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cypress semiconductor",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian gnu linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "digi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "edimax computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "engenius",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "endian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "espressif",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "extreme",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "f secure",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fortinet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "google",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hostap",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ipfire",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "juniper",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lancom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lede",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lifx",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microchip",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mojo",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nest",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netgear",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "opnsense",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "omnirom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "open mesh",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "peplink",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "riverbed",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung mobile",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sonos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sony",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sophos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "synology",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "tp link",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "technicolor",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "texas instruments",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba commerce",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba electronic devices storage",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba memory",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "turris omnia",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubiquiti",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubuntu",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "volumio",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "watchguard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xiaomi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xirrus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zebra",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zyxel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dd wrt",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "eero",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "pfsense",
        "version": null
      },
      {
        "model": "ubuntu",
        "scope": null,
        "trust": 0.8,
        "vendor": "canonical",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "freebsd",
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": "leap",
        "scope": null,
        "trust": 0.8,
        "vendor": "opensuse",
        "version": null
      },
      {
        "model": "linux enterprise desktop",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "linux enterprise point of sale",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "linux enterprise server",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "openstack cloud",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "hostapd",
        "scope": null,
        "trust": 0.8,
        "vendor": "w1 fi",
        "version": null
      },
      {
        "model": "wpa supplicant",
        "scope": null,
        "trust": 0.8,
        "vendor": "w1 fi",
        "version": null
      },
      {
        "model": "enterprise linux desktop",
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": "enterprise linux server",
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": "edge gateway",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "sr-m20ac1",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": "v02.10"
      },
      {
        "model": "sr-m20ac2",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": "v02.10"
      },
      {
        "model": "alliance wi-fi protected access 2",
        "scope": null,
        "trust": 0.6,
        "vendor": "wi fi",
        "version": null
      },
      {
        "model": "alliance w1.f1 wpa supplicant",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wi fi",
        "version": "2.6"
      },
      {
        "model": "scalance w-700",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "linux desktop",
        "version": "12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "linux server",
        "version": "11"
      },
      {
        "model": "atom processor c3200 series for yocto project bsp mr4",
        "scope": null,
        "trust": 0.3,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.1"
      },
      {
        "model": "pyxis supplystation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "sinamics smart access module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "v200"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6.27.3264"
      },
      {
        "model": "meraki mr34",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ck71a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.2.0"
      },
      {
        "model": "macbook air",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18500"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.0"
      },
      {
        "model": "meraki mr26",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "28000"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "meraki mr84",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "510x0"
      },
      {
        "model": "windows server r2 for itanium-based systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "contact itc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "81130"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.0.0"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "meraki mr18",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "8.1.0.3"
      },
      {
        "model": "scalance w1750d",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "secure ii med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3002"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "210x0"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1015110"
      },
      {
        "model": "aironet access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "contact fl wlan ap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.1"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "wap371 wireless-ac n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ex-handy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "2090"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.2"
      },
      {
        "model": "contact rad-80211-xd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.2"
      },
      {
        "model": "contact fl wlan dap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10.9.1"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.25"
      },
      {
        "model": "pyxis medstation es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "wireless ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88210"
      },
      {
        "model": "pyxis stockstation system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "macbook",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.7.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10.9.2"
      },
      {
        "model": "scalance wlc712",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "contact fl wlan spa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "meraki mr62",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "simatic et200 pro im154-6 pn iwlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "tropos broadband mesh routers and bridges",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "abb",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10.9.2"
      },
      {
        "model": "meraki mr33",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.3"
      },
      {
        "model": "micros handheld terminal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "0"
      },
      {
        "model": "windows server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "20120"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.33.9.2"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1017030"
      },
      {
        "model": "atom processor c3200 series for yocto project bsp mr4.1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "2.6"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.0"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "110x0"
      },
      {
        "model": "windows for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "100"
      },
      {
        "model": "s3 med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3002"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.2.4"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.1"
      },
      {
        "model": "contact fl comserver wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "232/422/4850"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.8"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7."
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.1.91.3272"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2.4.9"
      },
      {
        "model": "contact fl wlan ap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "230802-110"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.1"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "meraki mr14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.5"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18150"
      },
      {
        "model": "wireless client bridge 2.0.0.1-aruba501-b00",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "501"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.33.9.2"
      },
      {
        "model": "airport express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "clarity engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "1.0"
      },
      {
        "model": "meraki mr30h",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "airport extreme",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "windows server r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "20120"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.2.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "8.0"
      },
      {
        "model": "contact bl2 bpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.0.1"
      },
      {
        "model": "enterprise linux for ibm z systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "watch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "w1 f1",
        "version": "2.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "4.0"
      },
      {
        "model": "ruggedcom rx1400",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "cn70a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1015110"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3"
      },
      {
        "model": "pyxis parx handheld",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1.40.100"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1.1"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3"
      },
      {
        "model": "windows rt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.1"
      },
      {
        "model": "meraki mr42",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3.1.6"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.3"
      },
      {
        "model": "wap561 wireless-n dual radio selectable band access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.26.3000"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6"
      },
      {
        "model": "tvos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.0"
      },
      {
        "model": "windows server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2016"
      },
      {
        "model": "contact rad-whg/wlan-xd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.33.9.3"
      },
      {
        "model": "wi-fi update for boot camp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "6.4.0"
      },
      {
        "model": "suremark printer 2nr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.1"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.2"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "enterprise linux for power little endian",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.0.0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.8"
      },
      {
        "model": "windows server for x64-based systems sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "pyxis supply roller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.3"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3"
      },
      {
        "model": "telepresence collaboration endpoint",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.2.61.3535"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "70xx0"
      },
      {
        "model": "imac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr72",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "watchos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.25.3001"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "8.1.0.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.2"
      },
      {
        "model": "meraki mr53",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1"
      },
      {
        "model": "wap551 wireless-n single radio selectable band access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.0.0"
      },
      {
        "model": "wap121 wireless-n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "2.5"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6.0.1000"
      },
      {
        "model": "wireless client bridge 1.0.1.3-hp501-b0012",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "501"
      },
      {
        "model": "i.roc ci70-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.0.0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.2.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.1"
      },
      {
        "model": "cn70e-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.0.0.0"
      },
      {
        "model": "meraki mr24",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "suremark printer 1nr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "50xx0"
      },
      {
        "model": "meraki mr74",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ex-handy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "090"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.4.15"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.7.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.7.20"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.7.1"
      },
      {
        "model": "systems esp32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "espressif",
        "version": "0"
      },
      {
        "model": "watchos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.1"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "micros handheld terminal 2.03.0.0.021r",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "38000"
      },
      {
        "model": "pyxis parx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "dx70",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.1.9"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "intouch critical care bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "2141"
      },
      {
        "model": "pyxis anesthesia es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "aironet series officeextend access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18100"
      },
      {
        "model": "windows for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.10"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10.9.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0.55.3000"
      },
      {
        "model": "windows for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.10"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.0"
      },
      {
        "model": "meraki mr66",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10.9.1"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6"
      },
      {
        "model": "intouch critical care bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "2131"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.2"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18300"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0.0.50.1004"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.1.0"
      },
      {
        "model": "wap321 wireless-n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "simatic iwlan-pb/link",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "aironet 1810w series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "meraki mr52",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "meraki mr12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "airmesh msr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.7.20"
      },
      {
        "model": "watchos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.2"
      },
      {
        "model": "contact fl wlan ec",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2.4.8"
      },
      {
        "model": "systems esp8266",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "espressif",
        "version": "0"
      },
      {
        "model": "tv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "pad-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.0.1205"
      },
      {
        "model": "ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88610"
      },
      {
        "model": "clarity engine",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "1.0.0.1"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "15600"
      },
      {
        "model": "windows for 32-bit systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "7"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3.1.5"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.8"
      },
      {
        "model": "windows for x64-based systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "7"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "meraki mr58",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1016070"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10.9.2"
      },
      {
        "model": "pyxis parassist system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "windows server for 32-bit systems sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.0"
      },
      {
        "model": "simatic mobile panel 277 iwlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "pyxis medstation t2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "40000"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.2.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.0.1"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.0.0"
      },
      {
        "model": "wi-fi update for boot camp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "ipad",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "30xx0"
      },
      {
        "model": "enterprise linux for power big endian",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "w1 f1",
        "version": "2.6"
      },
      {
        "model": "wireless client bridge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "5010"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.0.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.5"
      },
      {
        "model": "meraki mr11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.3"
      },
      {
        "model": "pyxis anesthesia system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "40000"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "pyxis anesthesia system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "35000"
      },
      {
        "model": "automation stratix 15.3 jc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5100"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "pyxis ciisafe workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "??0"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.7"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.0.0"
      },
      {
        "model": "ipad air",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.1"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "enterprise linux for scientific computing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.1.71.3608"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1.41.3024"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.2.1"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "dx80",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.0"
      },
      {
        "model": "contact bl2 ppc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "contact tpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "60130"
      },
      {
        "model": "ipod touch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.1"
      },
      {
        "model": "ck70a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.7.20"
      },
      {
        "model": "macbook pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10"
      },
      {
        "model": "windows for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "100"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.8"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.5"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.4"
      },
      {
        "model": "smart-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.2.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.33.9.3"
      },
      {
        "model": "tab-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.3"
      },
      {
        "model": "iphone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "macmini",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.4.16"
      },
      {
        "model": "contact fl wlan epa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "airport time capsule",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "alliance wpa2 (wi-fi protected access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wi fi",
        "version": "2)0"
      },
      {
        "model": "airport base station",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.9"
      },
      {
        "model": "scalance wlc711",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "ruggedcom rs9xxw",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.15"
      },
      {
        "model": "networks unifi access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubiquiti",
        "version": "0"
      },
      {
        "model": "suremark printer 2cr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88650"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.7"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4"
      },
      {
        "model": "asa 5506w-x w/ firepower services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1016070"
      },
      {
        "model": "airport base station",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.9"
      },
      {
        "model": "s3 med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3005"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.0.0.0"
      },
      {
        "model": "smart-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "2010"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1017030"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "14.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "16.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "17.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "debian linux",
        "version": "8.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "debian linux",
        "version": "9.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "10.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "11.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "leap",
        "version": "42.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "leap",
        "version": "42.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux desktop",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux server",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.7.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.7.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux point of sale",
        "version": "11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux server",
        "version": "12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "openstack cloud",
        "version": "6"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "69402209-7265-4991-8217-51ff9b4857be"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13077"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:canonical:ubuntu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:debian:debian_linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:freebsd:freebsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:opensuse_project:leap",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:suse:linux_enterprise_desktop",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:suse:suse_linux_enterprise_point_of_sale",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:suse:linux_enterprise_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:suse:openstack_cloud",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:w1.fi:hostapd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:w1.fi:wpa_supplicant",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:nec:nec_edge_gateway",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:sr-m20ac1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:sr-m20ac2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mathy Vanhoef from imec-DistriNet and KU Leuven.",
    "sources": [
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2017-13077",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "CVE-2017-13077",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "CNVD-2017-30406",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "69402209-7265-4991-8217-51ff9b4857be",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.6,
            "id": "CVE-2017-13077",
            "impactScore": 5.2,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-13077",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-13077",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-30406",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201710-380",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "69402209-7265-4991-8217-51ff9b4857be",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-13077",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "69402209-7265-4991-8217-51ff9b4857be"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13077"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13077"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or \"KRACK\" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). The WPA2 wireless network has a PTK-TK key reload vulnerability in the fourth handshake. WPA2  is prone to multiple security weaknesses. \nExploiting these issues may allow an unauthorized user to intercept and manipulate data or disclose sensitive information. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: wpa_supplicant security update\nAdvisory ID:       RHSA-2017:2907-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2017:2907\nIssue date:        2017-10-17\nCVE Names:         CVE-2017-13077 CVE-2017-13078 CVE-2017-13080 \n                   CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 \n                   CVE-2017-13088 \n=====================================================================\n\n1. Summary:\n\nAn update for wpa_supplicant is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe wpa_supplicant packages contain an 802.1X Supplicant with support for\nWEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication\nmethods. They implement key negotiation with a WPA Authenticator for client\nstations and controls the roaming and IEEE 802.11 authentication and\nassociation of the WLAN driver. A remote attacker within Wi-Fi range\ncould exploit these attacks to decrypt Wi-Fi traffic or possibly inject\nforged Wi-Fi packets by manipulating cryptographic handshakes used by the\nWPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080,\nCVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)\n\nRed Hat would like to thank CERT for reporting these issues. Upstream\nacknowledges Mathy Vanhoef (University of Leuven) as the original reporter\nof these issues. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1491692 - CVE-2017-13077 wpa_supplicant: Reinstallation of the pairwise key in the 4-way handshake\n1491693 - CVE-2017-13078 wpa_supplicant: Reinstallation of the group key in the 4-way handshake\n1491696 - CVE-2017-13080 wpa_supplicant: Reinstallation of the group key in the group key handshake\n1491698 - CVE-2017-13082 wpa_supplicant: Accepting a retransmitted FT Reassociation Request and reinstalling the pairwise key while processing it\n1500302 - CVE-2017-13086 wpa_supplicant: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake\n1500303 - CVE-2017-13087 wpa_supplicant: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame\n1500304 - CVE-2017-13088 wpa_supplicant: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\naarch64:\nwpa_supplicant-2.6-5.el7_4.1.aarch64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.aarch64.rpm\n\nppc64:\nwpa_supplicant-2.6-5.el7_4.1.ppc64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64.rpm\n\nppc64le:\nwpa_supplicant-2.6-5.el7_4.1.ppc64le.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64le.rpm\n\ns390x:\nwpa_supplicant-2.6-5.el7_4.1.s390x.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.s390x.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-13077\nhttps://access.redhat.com/security/cve/CVE-2017-13078\nhttps://access.redhat.com/security/cve/CVE-2017-13080\nhttps://access.redhat.com/security/cve/CVE-2017-13082\nhttps://access.redhat.com/security/cve/CVE-2017-13086\nhttps://access.redhat.com/security/cve/CVE-2017-13087\nhttps://access.redhat.com/security/cve/CVE-2017-13088\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/kracks\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-12-12-2 AirPort Base Station Firmware Update 7.7.9\n\nAirPort Base Station Firmware Update 7.7.9 is now available and\naddresses the following:\n\nAirPort Base Station Firmware\nAvailable for: AirPort Extreme and AirPort Time Capsule base stations\nwith 802.11ac\nImpact: An attacker within range may be able to execute arbitrary\ncode on the Wi-Fi chip\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-9417: Nitay Artenstein of Exodus Intelligence\n\nAirPort Base Station Firmware\nAvailable for: AirPort Extreme and AirPort Time Capsule base stations\nwith 802.11ac\nImpact: An attacker in Wi-Fi range may force nonce reuse in WPA\nunicast/PTK clients (Key Reinstallation Attacks - KRACK)\nDescription: A logic issue existed in the handling of state\ntransitions. This was addressed with improved state management. \nCVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\nCVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\n\nAirPort Base Station Firmware\nAvailable for: AirPort Extreme and AirPort Time Capsule base stations\nwith 802.11ac\nImpact: An attacker in Wi-Fi range may force nonce reuse in WPA\nmulticast/GTK clients (Key Reinstallation Attacks - KRACK)\nDescription: A logic issue existed in the handling of state\ntransitions. This was addressed with improved state management. \nCVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\n\nInstallation note:\n\nFirmware version 7.7.9 is installed on AirPort Extreme or\nAirPort Time Capsule base stations with 802.11ac using\nAirPort Utility for Mac or iOS. \n\nAirPort Utility for Mac is a free download from\nhttps://support.apple.com/downloads/ and AirPort Utility for iOS\nis a free download from the App Store. \nCVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at\nKU Leuven\n\nInstallation note:\n\nWi-Fi Update for Boot Camp 6.4.0 may be obtained from Apple Software\nUpdate for Windows. Those vulnerabilities applies to both the access point\n(implemented in hostapd) and the station (implemented in wpa_supplicant). \n\nAn attacker exploiting the vulnerabilities could force the vulnerable system to\nreuse cryptographic session keys, enabling a range of cryptographic attacks\nagainst the ciphers used in WPA1 and WPA2. \n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 2:2.4-1+deb9u1. \n\nFor the testing distribution (buster), these problems have been fixed\nin version 2:2.4-1.1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2:2.4-1.1. \n\nWe recommend that you upgrade your wpa packages. ==========================================================================\nUbuntu Security Notice USN-3455-1\nOctober 16, 2017\n\nwpa vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 17.04\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in wpa_supplicant. \n\nSoftware Description:\n- wpa: client support for WPA and WPA2\n\nDetails:\n\nMathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly\nhandled WPA2. (CVE-2017-13077,\nCVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081,\nCVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)\n\nImre Rad discovered that wpa_supplicant and hostapd incorrectly handled\ninvalid characters in passphrase parameters. A remote attacker could use\nthis issue to cause a denial of service. (CVE-2016-4476)\n\nImre Rad discovered that wpa_supplicant and hostapd incorrectly handled\ninvalid characters in passphrase parameters. A local attacker could use\nthis issue to cause a denial of service, or possibly execute arbitrary\ncode. (CVE-2016-4477)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 17.04:\n  hostapd                         2.4-0ubuntu9.1\n  wpasupplicant                   2.4-0ubuntu9.1\n\nUbuntu 16.04 LTS:\n  hostapd                         2.4-0ubuntu6.2\n  wpasupplicant                   2.4-0ubuntu6.2\n\nUbuntu 14.04 LTS:\n  hostapd                         2.1-0ubuntu1.5\n  wpasupplicant                   2.1-0ubuntu1.5\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201711-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: hostapd and wpa_supplicant: Key Reinstallation (KRACK)\n           attacks\n     Date: November 10, 2017\n     Bugs: #634436, #634438\n       ID: 201711-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nA flaw was discovered in the 4-way handshake in hostapd and\nwpa_supplicant that allows attackers to conduct a Man in the Middle\nattack. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  net-wireless/hostapd         \u003c 2.6-r1                  \u003e= 2.6-r1 \n  2  net-wireless/wpa_supplicant\n                                  \u003c 2.6-r3                  \u003e= 2.6-r3 \n    -------------------------------------------------------------------\n     2 affected packages\n\nDescription\n===========\n\nWiFi Protected Access (WPA and WPA2) and it\u0027s associated technologies\nare all vulnerable to the KRACK attacks. Please review the referenced\nCVE identifiers for details. \n\nImpact\n======\n\nAn attacker can carry out the KRACK attacks on a wireless network in\norder to gain access to network clients. Once achieved, the attacker\ncan potentially harvest confidential information (e.g. HTTP/HTTPS),\ninject malware, or perform a myriad of other attacks. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll hostapd users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-wireless/hostapd-2.6-r1\"\n\nAll wpa_supplicant users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot -v \"\u003e=net-wireless/wpa_supplicant-2.6-r3\"\n\nReferences\n==========\n\n[  1 ] CVE-2017-13077\n       https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13077\n[  2 ] CVE-2017-13078\n       https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13078\n[  3 ] CVE-2017-13079\n       https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13079\n[  4 ] CVE-2017-13080\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-17:07.wpa                                        Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          WPA2 protocol vulnerability\n\nCategory:       contrib\nModule:         wpa\nAnnounced:      2017-10-16\nCredits:        Mathy Vanhoef\nAffects:        All supported versions of FreeBSD. \nCorrected:      2017-10-17 17:30:18 UTC (stable/11, 11.1-STABLE)\n                2017-10-17 17:57:18 UTC (releng/11.1, 11.1-RELEASE-p2)\n                2017-10-17 17:56:03 UTC (releng/11.0, 11.0-RELEASE-p13)\n                2017-10-19 03:18:22 UTC (stable/10, 10.4-STABLE)\n                2017-10-19 03:20:17 UTC (releng/10.4, 10.4-RELEASE-p1)\n                2017-10-19 03:19:42 UTC (releng/10.3, 10.3-RELEASE-p22)\nCVE Name:       CVE-2017-13077, CVE-2017-13078, CVE-2017-13079,\n                CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,\n                CVE-2017-13086, CVE-2017-13087, CVE-2017-13088\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:https://security.FreeBSD.org/\u003e. \n\n0.   Revision history\n\nv1.0  2017-10-17 Initial release. \nv1.1  2017-10-19 Add patches for 10.x releases. \n\nI. \n\nhostapd and wpa_supplicant are implementations of user space daemon for\naccess points and wireless client that implements the WPA2 protocol. \n\nII.  Problem Description\n\nA vulnerability was found in how a number of implementations can be\ntriggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by\nreplaying a specific frame that is used to manage the keys. \n\nIII. Impact\n\nSuch reinstallation of the encryption key can result in two different\ntypes of vulnerabilities: disabling replay protection and significantly\nreducing the security of encryption to the point of allowing frames to\nbe decrypted or some parts of the keys to be determined by an attacker\ndepending on which cipher is used. \n\nIV.  Workaround\n\nAn updated version of wpa_supplicant is available in the FreeBSD Ports\nCollection. Install version 2.6_2 or later of the\nsecurity/wpa_supplicant port/pkg. Once installed, update /etc/rc.conf\nto use the new binary:\n\nwpa_supplicant_program=\"/usr/local/sbin/wpa_supplicant\"\n\nand restart networking. \n\nAn updated version of hostapd is available in the FreeBSD Ports\nCollection. Install version 2.6_1 or later of the net/hostapd port/pkg. \nOnce installed, update /etc/rc.conf to use the new binary:\n\nhostapd_program=\"/usr/local/sbin/hostapd\"\n\nand restart hostapd. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\nRestart the Wi-Fi network interfaces/hostapd or reboot the system. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nRestart the Wi-Fi network interfaces/hostapd or reboot the system. \n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 11.0-RELEASE, 11.1-RELEASE, and 11-STABLE]\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch.asc\n# gpg --verify wpa-11.patch.asc\n\n[FreeBSD 10.3-RELEASE, 10.4-RELEASE, and 10-STABLE]\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch.asc\n# gpg --verify wpa-10.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in \u003cURL:https://www.FreeBSD.org/handbook/makeworld.html\u003e. \n\nRestart the applicable daemons, or reboot the system. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/11/                                                        r324697\nreleng/11.0/                                                      r324698\nreleng/11.1/                                                      r324699\nstable/10/                                                        r324739\nreleng/10.3/                                                      r324740\nreleng/10.4/                                                      r324741\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n\u003cURL:https://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\u003e\n\nVII. References\n\n\u003cURL:https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\u003e\n\u003cURL:https://www.krackattacks.com/\u003e\n\nThe latest revision of this advisory is available at\n\u003cURL:https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc\u003e\n-----BEGIN PGP SIGNATURE-----\n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\nETx2QOZgKnCs2oDNiw4aQHb7kvi2w94Iw/R1sAPkkxYJWO3reyE=\n=h/5q\n-----END PGP SIGNATURE-----\n. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz:  Upgraded. \n  This update includes patches to mitigate the WPA2 protocol issues known\n  as \"KRACK\" (Key Reinstallation AttaCK), which may be used to decrypt data,\n  hijack TCP connections, and to forge and inject packets. \n  CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT)\n    Reassociation Request and reinstalling the pairwise encryption key (PTK-TK)\n    while processing it. \n  For more information, see:\n    https://www.krackattacks.com/\n    https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088\n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.0 package:\nd8ecfaadb50b3547967ab53733ffc019  wpa_supplicant-2.6-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\nf25216d28800504ce498705da7c9a825  wpa_supplicant-2.6-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n15c61050e4bab2581757befd86be74c0  wpa_supplicant-2.6-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n49fd537a520338744f7757615556d352  wpa_supplicant-2.6-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\nc5539f40c8510af89be92945f0f80185  wpa_supplicant-2.6-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n4c527ff84fcdfd7839f217bbce2e4ae4  wpa_supplicant-2.6-x86_64-1_slack14.2.txz\n\nSlackware -current package:\n28bd88a54e96368f7a7020c1f5fb67fe  n/wpa_supplicant-2.6-i586-2.txz\n\nSlackware x86_64 -current package:\n464fc6b48d1ac077f47e9a3a8534c160  n/wpa_supplicant-2.6-x86_64-2.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-13077"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "IVD",
        "id": "69402209-7265-4991-8217-51ff9b4857be"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13077"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145395"
      },
      {
        "db": "PACKETSTORM",
        "id": "148445"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144944"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      }
    ],
    "trust": 4.23
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-13077",
        "trust": 4.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519",
        "trust": 4.2
      },
      {
        "db": "BID",
        "id": "101274",
        "trust": 2.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-17420",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1039577",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039576",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039581",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039578",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039585",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039573",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1041432",
        "trust": 1.7
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2017-003",
        "trust": 1.7
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2017-005",
        "trust": 1.7
      },
      {
        "db": "SIEMENS",
        "id": "SSA-901333",
        "trust": 1.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-18-114-01",
        "trust": 1.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-029-01",
        "trust": 1.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-353-02",
        "trust": 1.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-01",
        "trust": 1.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-325-01",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30406",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-380",
        "trust": 0.8
      },
      {
        "db": "JUNIPER",
        "id": "JSA10827",
        "trust": 0.8
      },
      {
        "db": "DLINK",
        "id": "SAP10075",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-02A",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU94846424",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU90609033",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008412",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4125",
        "trust": 0.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-299-02",
        "trust": 0.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-02",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "69402209-7265-4991-8217-51FF9B4857BE",
        "trust": 0.2
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13077",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144652",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145394",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145395",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "148445",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144630",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144632",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144944",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144669",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144663",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "69402209-7265-4991-8217-51ff9b4857be"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13077"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145395"
      },
      {
        "db": "PACKETSTORM",
        "id": "148445"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144944"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13077"
      }
    ]
  },
  "id": "VAR-201710-0206",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "69402209-7265-4991-8217-51ff9b4857be"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      }
    ],
    "trust": 1.4310640107692307
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "69402209-7265-4991-8217-51ff9b4857be"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      }
    ]
  },
  "last_update_date": "2025-12-22T23:41:01.766000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "ARUBA-PSA-2017-007",
        "trust": 0.8,
        "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt"
      },
      {
        "title": "DSA-3999",
        "trust": 0.8,
        "url": "https://www.debian.org/security/2017/dsa-3999"
      },
      {
        "title": "FreeBSD-SA-17:07.wpa",
        "trust": 0.8,
        "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-17:07.wpa.asc"
      },
      {
        "title": "LEN-17420",
        "trust": 0.8,
        "url": "https://support.lenovo.com/jp/en/product_security/len-17420"
      },
      {
        "title": "NV17-024",
        "trust": 0.8,
        "url": "http://jpn.nec.com/security-info/secinfo/nv17-024.html"
      },
      {
        "title": "KRACKs - wpa_supplicant Multiple Vulnerabilities",
        "trust": 0.8,
        "url": "https://access.redhat.com/security/vulnerabilities/kracks"
      },
      {
        "title": "RHSA-2017:2907",
        "trust": 0.8,
        "url": "https://access.redhat.com/errata/RHSA-2017:2907"
      },
      {
        "title": "RHSA-2017:2911",
        "trust": 0.8,
        "url": "https://access.redhat.com/errata/RHSA-2017:2911"
      },
      {
        "title": "USN-3455-1",
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/usn/USN-3455-1/"
      },
      {
        "title": "WPA packet number reuse with replayed messages and key reinstallation",
        "trust": 0.8,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt"
      },
      {
        "title": "Wi-Fi\u306e\u8a8d\u8a3c\uff0f\u6697\u53f7\u5316\u6280\u8853WPA2\u304a\u3088\u3073WPA\u306e\u8907\u6570\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066",
        "trust": 0.8,
        "url": "http://www.fujitsu.com/jp/products/network/support/2017/srm-01/index.html"
      },
      {
        "title": "WPA2\u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u5f0a\u793e\u8abf\u67fb\u30fb\u5bfe\u5fdc\u72b6\u6cc1\u306b\u3064\u3044\u3066",
        "trust": 0.8,
        "url": "http://www.iodata.jp/support/information/2017/wpa2/"
      },
      {
        "title": "\u7121\u7ddaLAN \u8a8d\u8a3c\uff0f\u6697\u53f7\u5316\u6280\u8853WPA2\u304a\u3088\u3073WPA\u306b\u95a2\u3059\u308b\u8106\u5f31\u6027\u306e\u304a\u77e5\u3089\u305b",
        "trust": 0.8,
        "url": "http://www.fmworld.net/biz/common/info/20171110/"
      },
      {
        "title": "Patch for WPA2 Wireless Network PTK-TK Encryption Key Reload Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/103818"
      },
      {
        "title": "Multiple WiFi product WPA2 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75494"
      },
      {
        "title": "Red Hat: Important: wpa_supplicant security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172911 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: wpa_supplicant security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172907 - Security Advisory"
      },
      {
        "title": "Red Hat: CVE-2017-13077",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2017-13077"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-13077"
      },
      {
        "title": "Apple: Wi-Fi Update for Boot Camp 6.4.0",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=4dc3bb86865485e4364fd6b2dc2fc379"
      },
      {
        "title": "Apple: AirPort Base Station Firmware Update 7.7.9",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7ca8130f8030911575aa17c0e84114dd"
      },
      {
        "title": "Apple: watchOS 4.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=345c3fa8a313cd9a1ced5ef372c465c4"
      },
      {
        "title": "Apple: AirPort Base Station Firmware Update 7.6.9",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=43d8dcf7961e20b6ec02761d12969c19"
      },
      {
        "title": "Debian CVElist Bug Report Logs: firmware-brcm80211: BroadPwn vulnerability CVE-2017-9417",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=2e0affd9108e95fa2aa2c706c74cd8a9"
      },
      {
        "title": "Ubuntu Security Notice: wpa vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3455-1"
      },
      {
        "title": "Debian Security Advisories: DSA-3999-1 wpa -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=08990d9925276738bd732fa4d58f9ef0"
      },
      {
        "title": "Apple: tvOS 11.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7a8e908aff7c02a31b2d335766e6d5c2"
      },
      {
        "title": "Apple: iOS 11.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7814c280e80969d4c4d88f74b13290f2"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-23] hostapd: man-in-the-middle",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-23"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-22] wpa_supplicant: man-in-the-middle",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-22"
      },
      {
        "title": "HP: HPSBPI03574 rev. 1 - WPA, WPA2 Key Reinstallation Attacks (KRACK attacks) Potential Remote Disclosure of Information: Certain HP Enterprise Printer and MFP products, Certain HP PageWide Printer and MFP Products, HP Jetdirect Accessory Products",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBPI03574"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=6df91267eee9400a24a98876f50ffe84"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014May 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=170d2de05a0349ffa4f579ee79da1e9d"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014November 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=8c29eb008bb212762e5cfb25c7c5c0d5"
      },
      {
        "title": "Cisco: Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20171016-wpa"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014July 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25584b3d319ca9e7cb2fae9ec5dbf5e0"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014August 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=746dc14fcd3f5e139648cfdc9d9039a9"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014June 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=cc496c56e2bf669809bfb568f59af8e1"
      },
      {
        "title": "HP: HPSBHF03571 rev. 6  -  Intel Management Engine Cumulative Security update and fix for WPA2 vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03571"
      },
      {
        "title": "Oracle: Oracle Critical Patch Update Advisory - April 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=4019ca77f50c7a34e4d97833e6f3321e"
      },
      {
        "title": "Apple: macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=870f3f04ef17f7b183f74ae687a1561d"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014April 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=068d787c35ce8cea494780f9a47b5827"
      },
      {
        "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=7251d5e5f2b1771951980ad7cfde50ba"
      },
      {
        "title": "Oracle: Oracle Critical Patch Update Advisory - January 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=e2a7f287e9acc8c64ab3df71130bc64d"
      },
      {
        "title": "vanhoefm-krackattacks-scripts",
        "trust": 0.1,
        "url": "https://github.com/84KaliPleXon3/vanhoefm-krackattacks-scripts "
      },
      {
        "title": "krankattack",
        "trust": 0.1,
        "url": "https://github.com/DevKosov/krankattack "
      },
      {
        "title": "krackattacks-scripts",
        "trust": 0.1,
        "url": "https://github.com/vanhoefm/krackattacks-scripts "
      },
      {
        "title": "KRACK",
        "trust": 0.1,
        "url": "https://github.com/chinatso/KRACK "
      },
      {
        "title": "krackinfo",
        "trust": 0.1,
        "url": "https://github.com/kristate/krackinfo "
      },
      {
        "title": "nixos-issue-db-example",
        "trust": 0.1,
        "url": "https://github.com/andir/nixos-issue-db-example "
      },
      {
        "title": "SamsungReleaseNotes",
        "trust": 0.1,
        "url": "https://github.com/samreleasenotes/SamsungReleaseNotes "
      },
      {
        "title": "welivesecurity",
        "trust": 0.1,
        "url": "https://www.welivesecurity.com/2019/10/17/alexa-how-amazon-echo-kindle-got-kracked/"
      },
      {
        "title": "BleepingComputer",
        "trust": 0.1,
        "url": "https://www.bleepingcomputer.com/news/security/millions-of-amazon-echo-and-kindle-devices-affected-by-wifi-bug/"
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2017/11/07/android_november_security_update/"
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2017/10/16/wpa2_inscure_krackattack/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13077"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-330",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-254",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13077"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.7,
        "url": "https://www.krackattacks.com/"
      },
      {
        "trust": 3.3,
        "url": "https://source.android.com/security/bulletin/2017-11-01"
      },
      {
        "trust": 2.9,
        "url": "http://www.securityfocus.com/bid/101274"
      },
      {
        "trust": 2.8,
        "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-007.txt"
      },
      {
        "trust": 2.8,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171016-wpa"
      },
      {
        "trust": 2.6,
        "url": "https://access.redhat.com/security/vulnerabilities/kracks"
      },
      {
        "trust": 2.5,
        "url": "http://www.debian.org/security/2017/dsa-3999"
      },
      {
        "trust": 2.1,
        "url": "http://www.kb.cert.org/vuls/id/228519"
      },
      {
        "trust": 2.1,
        "url": "https://access.redhat.com/errata/rhsa-2017:2911"
      },
      {
        "trust": 2.1,
        "url": "https://access.redhat.com/errata/rhsa-2017:2907"
      },
      {
        "trust": 2.0,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
      },
      {
        "trust": 1.8,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt"
      },
      {
        "trust": 1.8,
        "url": "http://www.ubuntu.com/usn/usn-3455-1"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039585"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039581"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039578"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039577"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039576"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039573"
      },
      {
        "trust": 1.7,
        "url": "https://support.lenovo.com/us/en/product_security/len-17420"
      },
      {
        "trust": 1.7,
        "url": "https://security.freebsd.org/advisories/freebsd-sa-17:07.wpa.asc"
      },
      {
        "trust": 1.7,
        "url": "https://security.gentoo.org/glsa/201711-03"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208222"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208221"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208220"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208219"
      },
      {
        "trust": 1.7,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
      },
      {
        "trust": 1.7,
        "url": "https://source.android.com/security/bulletin/2018-04-01"
      },
      {
        "trust": 1.7,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03792en_us"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2017-005"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2017-003"
      },
      {
        "trust": 1.7,
        "url": "https://source.android.com/security/bulletin/2018-06-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1041432"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html"
      },
      {
        "trust": 1.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13077"
      },
      {
        "trust": 1.2,
        "url": "https://ics-cert.us-cert.gov/advisories/icsma-18-114-01"
      },
      {
        "trust": 1.1,
        "url": "https://papers.mathyvanhoef.com/ccs2017.pdf"
      },
      {
        "trust": 1.1,
        "url": "https://w1.fi/security/2017-1/"
      },
      {
        "trust": 1.1,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00101\u0026languageid=en-fr"
      },
      {
        "trust": 1.1,
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-13080"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-353-02"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-01"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-325-01"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsma-19-029-01"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13078"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13077"
      },
      {
        "trust": 0.8,
        "url": "https://cwe.mitre.org/data/definitions/323.html"
      },
      {
        "trust": 0.8,
        "url": "https://actiontecsupport.zendesk.com/hc/en-us/articles/115005205283-krack-vulnerability"
      },
      {
        "trust": 0.8,
        "url": "https://www3.aerohive.com/support/security-bulletins/product-security-announcement-aerohives-response-to-krack-10162017.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.al-enterprise.com/en/support/security-alert-krack"
      },
      {
        "trust": 0.8,
        "url": "https://support.apple.com/en-gb/ht208222"
      },
      {
        "trust": 0.8,
        "url": "https://security.archlinux.org/avg-447"
      },
      {
        "trust": 0.8,
        "url": "https://www.asus.com/static_webpage/asus-product-security-advisory/"
      },
      {
        "trust": 0.8,
        "url": "https://community.barracudanetworks.com/forum/index.php?/topic/23525-security-advisories/page-2"
      },
      {
        "trust": 0.8,
        "url": "https://lists.centos.org/pipermail/centos-announce/2017-october/022569.html"
      },
      {
        "trust": 0.8,
        "url": "https://community.cypress.com/docs/doc-13871"
      },
      {
        "trust": 0.8,
        "url": "http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10075"
      },
      {
        "trust": 0.8,
        "url": "http://www.dell.com/support/article/sln307822"
      },
      {
        "trust": 0.8,
        "url": "https://github.com/espressif/esp8266_nonos_sdk"
      },
      {
        "trust": 0.8,
        "url": "https://extremeportal.force.com/extrarticledetail?n=000018005"
      },
      {
        "trust": 0.8,
        "url": "https://bodhi.fedoraproject.org/updates/fedora-2017-60bfb576b7"
      },
      {
        "trust": 0.8,
        "url": "http://www.fortiguard.com/psirt/fg-ir-17-196"
      },
      {
        "trust": 0.8,
        "url": "https://www.freebsd.org/security/advisories/freebsd-sa-17:07.wpa.asc"
      },
      {
        "trust": 0.8,
        "url": "https://bugs.gentoo.org/634440"
      },
      {
        "trust": 0.8,
        "url": "https://support.hpe.com/hpsc/doc/public/display?sp4ts.oid=null\u0026doclocale=en_us\u0026docid=emr_na-a00029151en_us"
      },
      {
        "trust": 0.8,
        "url": "https://kb.juniper.net/jsa10827"
      },
      {
        "trust": 0.8,
        "url": "https://support.lenovo.com/ca/en/product_security/len-17420"
      },
      {
        "trust": 0.8,
        "url": "http://www.microchip.com/wwwproducts/en/atwinc1500"
      },
      {
        "trust": 0.8,
        "url": "http://mail-index.netbsd.org/source-changes/2017/10/16/msg088877.html"
      },
      {
        "trust": 0.8,
        "url": "https://kb.netgear.com/000049498/security-advisory-for-wpa-2-vulnerabilities-psv-2017-2826-psv-2017-2836-psv-2017-2837"
      },
      {
        "trust": 0.8,
        "url": "https://forum.peplink.com/t/security-advisory-wpa2-vulnerability-vu-228519/12715"
      },
      {
        "trust": 0.8,
        "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-101617-v1.0.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://www.suse.com/de-de/support/kb/doc/?id=7022107"
      },
      {
        "trust": 0.8,
        "url": "https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---wpa-and-wpa2-vulnerabilities/"
      },
      {
        "trust": 0.8,
        "url": "http://www.slackware.com/changelog/stable.php?cpu=x86_64"
      },
      {
        "trust": 0.8,
        "url": "https://community.sophos.com/kb/en-us/127658"
      },
      {
        "trust": 0.8,
        "url": "https://www.toshibacommerce.com/wps/myportal/%21ut/p/a1/rzrnc8igeiz_sw8egqhjcdmmwr8abw2dqcnfoyqotidrrk399uxrrwotuzgws7a87y6z88iuzmcq2u4uwcnlzypjnjj5-exr_wnhya-laxtrid-j3uchdtb8gylmuw6qzgktovtowsrrqlrs6-8dbeqhwc1mykqnlabgdjlf1yjvn7i5af4qtdwsn2tri7j"
      },
      {
        "trust": 0.8,
        "url": "http://www.toshiba-personalstorage.net/en/news/hdd/ot_notice/20171017.htm"
      },
      {
        "trust": 0.8,
        "url": "http://support.toshiba.com/support/staticcontentdetail?contentid=4015875\u0026isfromtoclink=false"
      },
      {
        "trust": 0.8,
        "url": "https://community.ubnt.com/t5/unifi-updates-blog/firmware-3-9-3-7537-for-uap-usw-has-been-released/ba-p/2099365"
      },
      {
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/usn/usn-3455-1/"
      },
      {
        "trust": 0.8,
        "url": "http://en.miui.com/thread-954223-1-1.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.zebra.com/content/dam/zebra_new_ia/en-us/support-and-downloads/lifeguard-security/krack-security-bulletin.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://www.zyxel.com/support/announcement_wpa2_key_management.shtml"
      },
      {
        "trust": 0.8,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk120938"
      },
      {
        "trust": 0.8,
        "url": "https://community.rsa.com/docs/doc-84103"
      },
      {
        "trust": 0.8,
        "url": "https://support.f5.com/csp/article/k23642330"
      },
      {
        "trust": 0.8,
        "url": "https://forum.mikrotik.com/viewtopic.php?f=21\u0026t=126695"
      },
      {
        "trust": 0.8,
        "url": "https://community.linksys.com/t5/wireless-routers/krack-vulnerability/td-p/1218573"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13080"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-02a"
      },
      {
        "trust": 0.8,
        "url": "https://www.ipa.go.jp/security/ciadr/vul/20171017_wpa2.html"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu94846424/"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu90609033/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.kb.cert.org/vuls/id/cheu-aqnmyp"
      },
      {
        "trust": 0.6,
        "url": "https://www.kb.cert.org/vuls/id/228519/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4125/"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13082"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13087"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13086"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13088"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13079"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13077"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13078"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13080"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13082"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13086"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13087"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13088"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13081"
      },
      {
        "trust": 0.3,
        "url": "https://github.com/stevenhoneyman/wpa_gui/tree/master/wpa_supplicant-2.4"
      },
      {
        "trust": 0.3,
        "url": "http://www.wi-fi.org/index.php"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-ie/ht208847"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208334"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208327"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208325"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2017/dec/msg00009.html"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2017/dec/msg00008.html"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2018/jul/msg00000.html"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13079"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13081"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13084"
      },
      {
        "trust": 0.3,
        "url": "http://docs.fortinet.com/uploaded/files/3961/fortiap-v5.6.1-release-notes.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-299-02"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-02"
      },
      {
        "trust": 0.2,
        "url": "https://support.apple.com/downloads/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/330.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/kristate/krackinfo"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.1,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9417"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/kb/ht201222"
      },
      {
        "trust": 0.1,
        "url": "https://www.apple.com/support/security/pgp/"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/kb/ht208038"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4476"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4477"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2.1-0ubuntu1.5"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu9.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu6.2"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-13078"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-13079"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-13077"
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-10.patch.asc"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/advisories/freebsd-sa-17:07.wpa.asc\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://www.krackattacks.com/\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-11.patch.asc"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/\u003e."
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-11.patch"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-10.patch"
      },
      {
        "trust": 0.1,
        "url": "https://www.freebsd.org/handbook/makeworld.html\u003e."
      },
      {
        "trust": 0.1,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13078"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13080"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13082"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13087"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13081"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13084"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com/gpg-key"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13086"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13088"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13079"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13084"
      },
      {
        "trust": 0.1,
        "url": "http://osuosl.org)"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13077"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145395"
      },
      {
        "db": "PACKETSTORM",
        "id": "148445"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144944"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13077"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "69402209-7265-4991-8217-51ff9b4857be"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13077"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145395"
      },
      {
        "db": "PACKETSTORM",
        "id": "148445"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144944"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13077"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-10-17T00:00:00",
        "db": "IVD",
        "id": "69402209-7265-4991-8217-51ff9b4857be"
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "date": "2017-10-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-13077"
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "BID",
        "id": "101274"
      },
      {
        "date": "2017-10-17T16:52:00",
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "date": "2017-12-13T03:33:33",
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "date": "2017-12-13T04:44:44",
        "db": "PACKETSTORM",
        "id": "145395"
      },
      {
        "date": "2018-07-05T23:02:22",
        "db": "PACKETSTORM",
        "id": "148445"
      },
      {
        "date": "2017-10-16T13:49:34",
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "date": "2017-10-16T23:23:00",
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "date": "2017-11-10T19:19:00",
        "db": "PACKETSTORM",
        "id": "144944"
      },
      {
        "date": "2017-10-19T14:28:55",
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "date": "2017-10-18T20:44:00",
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      },
      {
        "date": "2017-10-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      },
      {
        "date": "2017-10-17T02:29:00.207000",
        "db": "NVD",
        "id": "CVE-2017-13077"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-30406"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-13077"
      },
      {
        "date": "2019-02-21T09:00:00",
        "db": "BID",
        "id": "101274"
      },
      {
        "date": "2020-11-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      },
      {
        "date": "2019-02-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-008412"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2017-13077"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "security feature problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-380"
      }
    ],
    "trust": 0.6
  }
}

VAR-201710-0974

Vulnerability from variot - Updated: 2025-12-22 23:36

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or "KRACK" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). A group key reload vulnerability exists in WPA2 wireless network sleep mode. WPA2 is prone to multiple security weaknesses. Exploiting these issues may allow an unauthorized user to intercept and manipulate data or disclose sensitive information. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: wpa_supplicant security update Advisory ID: RHSA-2017:2907-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2907 Issue date: 2017-10-17 CVE Names: CVE-2017-13077 CVE-2017-13078 CVE-2017-13080 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 =====================================================================

  1. Summary:

An update for wpa_supplicant is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64

  1. Description:

The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)

Red Hat would like to thank CERT for reporting these issues. Upstream acknowledges Mathy Vanhoef (University of Leuven) as the original reporter of these issues. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

aarch64: wpa_supplicant-2.6-5.el7_4.1.aarch64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.aarch64.rpm

ppc64: wpa_supplicant-2.6-5.el7_4.1.ppc64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64.rpm

ppc64le: wpa_supplicant-2.6-5.el7_4.1.ppc64le.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64le.rpm

s390x: wpa_supplicant-2.6-5.el7_4.1.s390x.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.s390x.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2017-13077 https://access.redhat.com/security/cve/CVE-2017-13078 https://access.redhat.com/security/cve/CVE-2017-13080 https://access.redhat.com/security/cve/CVE-2017-13082 https://access.redhat.com/security/cve/CVE-2017-13086 https://access.redhat.com/security/cve/CVE-2017-13087 https://access.redhat.com/security/cve/CVE-2017-13088 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/kracks

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc. Those vulnerabilities applies to both the access point (implemented in hostapd) and the station (implemented in wpa_supplicant).

An attacker exploiting the vulnerabilities could force the vulnerable system to reuse cryptographic session keys, enabling a range of cryptographic attacks against the ciphers used in WPA1 and WPA2.

For the stable distribution (stretch), these problems have been fixed in version 2:2.4-1+deb9u1.

For the testing distribution (buster), these problems have been fixed in version 2:2.4-1.1.

For the unstable distribution (sid), these problems have been fixed in version 2:2.4-1.1.

We recommend that you upgrade your wpa packages. ========================================================================== Ubuntu Security Notice USN-3455-1 October 16, 2017

wpa vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in wpa_supplicant.

Software Description: - wpa: client support for WPA and WPA2

Details:

Mathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly handled WPA2. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)

Imre Rad discovered that wpa_supplicant and hostapd incorrectly handled invalid characters in passphrase parameters. A remote attacker could use this issue to cause a denial of service. (CVE-2016-4476)

Imre Rad discovered that wpa_supplicant and hostapd incorrectly handled invalid characters in passphrase parameters. A local attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. (CVE-2016-4477)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.04: hostapd 2.4-0ubuntu9.1 wpasupplicant 2.4-0ubuntu9.1

Ubuntu 16.04 LTS: hostapd 2.4-0ubuntu6.2 wpasupplicant 2.4-0ubuntu6.2

Ubuntu 14.04 LTS: hostapd 2.1-0ubuntu1.5 wpasupplicant 2.1-0ubuntu1.5

After a standard system update you need to reboot your computer to make all the necessary changes. 6) - i386, x86_64

Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz: Upgraded. This update includes patches to mitigate the WPA2 protocol issues known as "KRACK" (Key Reinstallation AttaCK), which may be used to decrypt data, hijack TCP connections, and to forge and inject packets. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. For more information, see: https://www.krackattacks.com/ https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088 ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz

Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz

Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz

MD5 signatures: +-------------+

Slackware 14.0 package: d8ecfaadb50b3547967ab53733ffc019 wpa_supplicant-2.6-i486-1_slack14.0.txz

Slackware x86_64 14.0 package: f25216d28800504ce498705da7c9a825 wpa_supplicant-2.6-x86_64-1_slack14.0.txz

Slackware 14.1 package: 15c61050e4bab2581757befd86be74c0 wpa_supplicant-2.6-i486-1_slack14.1.txz

Slackware x86_64 14.1 package: 49fd537a520338744f7757615556d352 wpa_supplicant-2.6-x86_64-1_slack14.1.txz

Slackware 14.2 package: c5539f40c8510af89be92945f0f80185 wpa_supplicant-2.6-i586-1_slack14.2.txz

Slackware x86_64 14.2 package: 4c527ff84fcdfd7839f217bbce2e4ae4 wpa_supplicant-2.6-x86_64-1_slack14.2.txz

Slackware -current package: 28bd88a54e96368f7a7020c1f5fb67fe n/wpa_supplicant-2.6-i586-2.txz

Slackware x86_64 -current package: 464fc6b48d1ac077f47e9a3a8534c160 n/wpa_supplicant-2.6-x86_64-2.txz

Installation instructions: +------------------------+

Upgrade the package as root:

upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

============================================================================= FreeBSD-SA-17:07.wpa Security Advisory The FreeBSD Project

Topic: WPA2 protocol vulnerability

Category: contrib Module: wpa Announced: 2017-10-16 Credits: Mathy Vanhoef Affects: All supported versions of FreeBSD. Corrected: 2017-10-17 17:30:18 UTC (stable/11, 11.1-STABLE) 2017-10-17 17:57:18 UTC (releng/11.1, 11.1-RELEASE-p2) 2017-10-17 17:56:03 UTC (releng/11.0, 11.0-RELEASE-p13) 2017-10-19 03:18:22 UTC (stable/10, 10.4-STABLE) 2017-10-19 03:20:17 UTC (releng/10.4, 10.4-RELEASE-p1) 2017-10-19 03:19:42 UTC (releng/10.3, 10.3-RELEASE-p22) CVE Name: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .

  1. Revision history

v1.0 2017-10-17 Initial release. v1.1 2017-10-19 Add patches for 10.x releases.

I.

hostapd and wpa_supplicant are implementations of user space daemon for access points and wireless client that implements the WPA2 protocol.

II. Problem Description

A vulnerability was found in how a number of implementations can be triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by replaying a specific frame that is used to manage the keys.

III. Impact

Such reinstallation of the encryption key can result in two different types of vulnerabilities: disabling replay protection and significantly reducing the security of encryption to the point of allowing frames to be decrypted or some parts of the keys to be determined by an attacker depending on which cipher is used.

IV. Workaround

An updated version of wpa_supplicant is available in the FreeBSD Ports Collection. Install version 2.6_2 or later of the security/wpa_supplicant port/pkg. Once installed, update /etc/rc.conf to use the new binary:

wpa_supplicant_program="/usr/local/sbin/wpa_supplicant"

and restart networking.

An updated version of hostapd is available in the FreeBSD Ports Collection. Install version 2.6_1 or later of the net/hostapd port/pkg. Once installed, update /etc/rc.conf to use the new binary:

hostapd_program="/usr/local/sbin/hostapd"

and restart hostapd.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

Restart the Wi-Fi network interfaces/hostapd or reboot the system.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

Restart the Wi-Fi network interfaces/hostapd or reboot the system.

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 11.0-RELEASE, 11.1-RELEASE, and 11-STABLE]

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch.asc

gpg --verify wpa-11.patch.asc

[FreeBSD 10.3-RELEASE, 10.4-RELEASE, and 10-STABLE]

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch.asc

gpg --verify wpa-10.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart the applicable daemons, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/11/ r324697 releng/11.0/ r324698 releng/11.1/ r324699 stable/10/ r324739 releng/10.3/ r324740 releng/10.4/ r324741


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEEHPf/b631yp++G4yy7Wfs1l3PaucFAlnoGpNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDFD RjdGRjZGQURGNUNBOUZCRTFCOENCMkVENjdFQ0Q2NURDRjZBRTcACgkQ7Wfs1l3P auc7WBAAm27w+fujv5sJsRxauUMopTVtRh5utwbDuoHTP+L+RCWmQfVBmueNQ0gf uJzMNxBIkbtY9LvyukpRsH3iD7mh26c0pd9rxxkkr4F96C9B5+W0amxJF1gdm54/ F/50FpY+lo7cNs5tiBjypPrg8UOBBI/1G4XR7130XC0HjaTwt1ngZ0oQUWUMSsIp gN5ZfPul81WPWd1NqF+vyObcJhwq/Y1uoexoO27o7GQCFZoL3enZy8c4f1xqMlVM 4HHkTgNGac6E0aW+ArH4J0DFFAOJXPqF8rdt+9XINfoBbtliIyOixJ4oh1n6eAR0 VpBWZKFNyXSlUKIvDGa+LDhxgL1jJXV0ABSyKlUOijdmr3bbbiQE9MW/MNv2AFTd OAFQ0QQtm9KCWp5JLh+FPIb/kR2l7MOUP+yz4zFcJpdGtl9tDLyPN8vRTq60bY8O y7tBcf/SMqkd/AIFdchL4zrOguKnRARydIlwTarp8wtAQI3MKSsa1B0wgsDtlL6K xfdjnwWMKvKKlNOW16e1WXXO0n/ucHV4njBE+bGPro3jLgXP2/WFZpIGAR3I4xrr SdD4AxSNiR9f3bL7LRfMIbugJAylWNSlTLWUOVUv0/ONh85LqbcCj13NI230B64K ETx2QOZgKnCs2oDNiw4aQHb7kvi2w94Iw/R1sAPkkxYJWO3reyE= =h/5q -----END PGP SIGNATURE-----

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0974",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "linux enterprise point of sale",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "openstack cloud",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "6"
      },
      {
        "model": "linux enterprise desktop",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.5"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.9"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "14.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.5"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "*"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.6"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "10"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.10"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.2"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.6"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.5"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.4"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.8"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.1"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.10"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.7.3"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.0"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.4"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.8"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.6"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.7.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "11.1"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.0"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.6"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.4"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.1"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.8"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "42.2"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.7"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "17.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.4"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "10.4"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.10"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.1"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.5"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.3"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.11"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.2"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.8"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "11"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.8"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "42.3"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "9front",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "adtran",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "avm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "actiontec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "aerohive",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "android open source",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "arch linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "aruba",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "asustek computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "barracuda",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cambium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "centos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cradlepoint",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cypress semiconductor",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian gnu linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "digi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "edimax computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "engenius",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "endian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "espressif",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "extreme",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "f secure",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fortinet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "google",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hostap",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ipfire",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "juniper",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lancom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lede",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lifx",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microchip",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mojo",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nest",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netgear",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "opnsense",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "omnirom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "open mesh",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "peplink",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "riverbed",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung mobile",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sonos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sony",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sophos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "synology",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "tp link",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "technicolor",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "texas instruments",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba commerce",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba electronic devices storage",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba memory",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "turris omnia",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubiquiti",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubuntu",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "volumio",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "watchguard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xiaomi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xirrus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zebra",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zyxel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dd wrt",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "eero",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "pfsense",
        "version": null
      },
      {
        "model": "ubuntu",
        "scope": null,
        "trust": 0.8,
        "vendor": "canonical",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "freebsd",
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": "leap",
        "scope": null,
        "trust": 0.8,
        "vendor": "opensuse",
        "version": null
      },
      {
        "model": "linux enterprise desktop",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "linux enterprise point of sale",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "linux enterprise server",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "openstack cloud",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "hostapd",
        "scope": null,
        "trust": 0.8,
        "vendor": "w1 fi",
        "version": null
      },
      {
        "model": "wpa supplicant",
        "scope": null,
        "trust": 0.8,
        "vendor": "w1 fi",
        "version": null
      },
      {
        "model": "enterprise linux desktop",
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": "enterprise linux server",
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": "edge gateway",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "sr-m20ac1",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": "v02.10"
      },
      {
        "model": "sr-m20ac2",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": "v02.10"
      },
      {
        "model": "alliance wi-fi protected access 2",
        "scope": null,
        "trust": 0.6,
        "vendor": "wi fi",
        "version": null
      },
      {
        "model": "scalance w-700",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "linux desktop",
        "version": "12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "linux server",
        "version": "11"
      },
      {
        "model": "atom processor c3200 series for yocto project bsp mr4",
        "scope": null,
        "trust": 0.3,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.1"
      },
      {
        "model": "pyxis supplystation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "sinamics smart access module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "v200"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6.27.3264"
      },
      {
        "model": "meraki mr34",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ck71a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.2.0"
      },
      {
        "model": "macbook air",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18500"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.0"
      },
      {
        "model": "meraki mr26",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "28000"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "meraki mr84",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "510x0"
      },
      {
        "model": "windows server r2 for itanium-based systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "contact itc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "81130"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.0.0"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "meraki mr18",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "8.1.0.3"
      },
      {
        "model": "scalance w1750d",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "secure ii med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3002"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "210x0"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1015110"
      },
      {
        "model": "aironet access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "contact fl wlan ap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.1"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "wap371 wireless-ac n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ex-handy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "2090"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.2"
      },
      {
        "model": "contact rad-80211-xd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.2"
      },
      {
        "model": "contact fl wlan dap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10.9.1"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.25"
      },
      {
        "model": "pyxis medstation es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "wireless ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88210"
      },
      {
        "model": "pyxis stockstation system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "macbook",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.7.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10.9.2"
      },
      {
        "model": "scalance wlc712",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "contact fl wlan spa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "meraki mr62",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "simatic et200 pro im154-6 pn iwlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "tropos broadband mesh routers and bridges",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "abb",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10.9.2"
      },
      {
        "model": "meraki mr33",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.3"
      },
      {
        "model": "micros handheld terminal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "0"
      },
      {
        "model": "windows server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "20120"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.33.9.2"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1017030"
      },
      {
        "model": "atom processor c3200 series for yocto project bsp mr4.1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "2.6"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.0"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "110x0"
      },
      {
        "model": "windows for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "100"
      },
      {
        "model": "s3 med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3002"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.2.4"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.1"
      },
      {
        "model": "contact fl comserver wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "232/422/4850"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.8"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7."
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.1.91.3272"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2.4.9"
      },
      {
        "model": "contact fl wlan ap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "230802-110"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.1"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "meraki mr14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.5"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18150"
      },
      {
        "model": "wireless client bridge 2.0.0.1-aruba501-b00",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "501"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.33.9.2"
      },
      {
        "model": "airport express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "clarity engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "1.0"
      },
      {
        "model": "meraki mr30h",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "airport extreme",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "windows server r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "20120"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.2.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "8.0"
      },
      {
        "model": "contact bl2 bpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.0.1"
      },
      {
        "model": "enterprise linux for ibm z systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "watch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "w1 f1",
        "version": "2.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "4.0"
      },
      {
        "model": "ruggedcom rx1400",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "cn70a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1015110"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3"
      },
      {
        "model": "pyxis parx handheld",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1.40.100"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1.1"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3"
      },
      {
        "model": "windows rt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.1"
      },
      {
        "model": "meraki mr42",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3.1.6"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.3"
      },
      {
        "model": "wap561 wireless-n dual radio selectable band access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.26.3000"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6"
      },
      {
        "model": "tvos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.0"
      },
      {
        "model": "windows server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2016"
      },
      {
        "model": "contact rad-whg/wlan-xd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.33.9.3"
      },
      {
        "model": "wi-fi update for boot camp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "6.4.0"
      },
      {
        "model": "suremark printer 2nr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.1"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.2"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "enterprise linux for power little endian",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.0.0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.8"
      },
      {
        "model": "windows server for x64-based systems sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "pyxis supply roller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.3"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3"
      },
      {
        "model": "telepresence collaboration endpoint",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.2.61.3535"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "70xx0"
      },
      {
        "model": "imac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr72",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "watchos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.25.3001"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "8.1.0.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.2"
      },
      {
        "model": "meraki mr53",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1"
      },
      {
        "model": "wap551 wireless-n single radio selectable band access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.0.0"
      },
      {
        "model": "wap121 wireless-n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "2.5"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6.0.1000"
      },
      {
        "model": "wireless client bridge 1.0.1.3-hp501-b0012",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "501"
      },
      {
        "model": "i.roc ci70-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.0.0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.2.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.1"
      },
      {
        "model": "cn70e-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.0.0.0"
      },
      {
        "model": "meraki mr24",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "suremark printer 1nr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "50xx0"
      },
      {
        "model": "meraki mr74",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ex-handy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "090"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.4.15"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.7.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.7.20"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.7.1"
      },
      {
        "model": "systems esp32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "espressif",
        "version": "0"
      },
      {
        "model": "watchos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.1"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "micros handheld terminal 2.03.0.0.021r",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "38000"
      },
      {
        "model": "pyxis parx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "dx70",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.1.9"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "intouch critical care bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "2141"
      },
      {
        "model": "pyxis anesthesia es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "aironet series officeextend access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18100"
      },
      {
        "model": "windows for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.10"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10.9.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0.55.3000"
      },
      {
        "model": "windows for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.10"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.0"
      },
      {
        "model": "meraki mr66",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10.9.1"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6"
      },
      {
        "model": "intouch critical care bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "2131"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.2"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18300"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0.0.50.1004"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.1.0"
      },
      {
        "model": "wap321 wireless-n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "simatic iwlan-pb/link",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "aironet 1810w series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "meraki mr52",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "meraki mr12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "airmesh msr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.7.20"
      },
      {
        "model": "watchos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.2"
      },
      {
        "model": "contact fl wlan ec",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2.4.8"
      },
      {
        "model": "systems esp8266",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "espressif",
        "version": "0"
      },
      {
        "model": "tv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "pad-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.0.1205"
      },
      {
        "model": "ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88610"
      },
      {
        "model": "clarity engine",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "1.0.0.1"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "15600"
      },
      {
        "model": "windows for 32-bit systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "7"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3.1.5"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.8"
      },
      {
        "model": "windows for x64-based systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "7"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "meraki mr58",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1016070"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10.9.2"
      },
      {
        "model": "pyxis parassist system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "windows server for 32-bit systems sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.0"
      },
      {
        "model": "simatic mobile panel 277 iwlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "pyxis medstation t2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "40000"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.2.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.0.1"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.0.0"
      },
      {
        "model": "wi-fi update for boot camp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "ipad",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "30xx0"
      },
      {
        "model": "enterprise linux for power big endian",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "w1 f1",
        "version": "2.6"
      },
      {
        "model": "wireless client bridge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "5010"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.0.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.5"
      },
      {
        "model": "meraki mr11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.3"
      },
      {
        "model": "pyxis anesthesia system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "40000"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "pyxis anesthesia system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "35000"
      },
      {
        "model": "automation stratix 15.3 jc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5100"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "pyxis ciisafe workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "??0"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.7"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.0.0"
      },
      {
        "model": "ipad air",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.1"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "enterprise linux for scientific computing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.1.71.3608"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1.41.3024"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.2.1"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "dx80",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.0"
      },
      {
        "model": "contact bl2 ppc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "contact tpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "60130"
      },
      {
        "model": "ipod touch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.1"
      },
      {
        "model": "ck70a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.7.20"
      },
      {
        "model": "macbook pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10"
      },
      {
        "model": "windows for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "100"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.8"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.5"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.4"
      },
      {
        "model": "smart-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.2.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.33.9.3"
      },
      {
        "model": "tab-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.3"
      },
      {
        "model": "iphone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "macmini",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.4.16"
      },
      {
        "model": "contact fl wlan epa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "airport time capsule",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "alliance wpa2 (wi-fi protected access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wi fi",
        "version": "2)0"
      },
      {
        "model": "airport base station",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.9"
      },
      {
        "model": "scalance wlc711",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "ruggedcom rs9xxw",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.15"
      },
      {
        "model": "networks unifi access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubiquiti",
        "version": "0"
      },
      {
        "model": "suremark printer 2cr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88650"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.7"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4"
      },
      {
        "model": "asa 5506w-x w/ firepower services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1016070"
      },
      {
        "model": "airport base station",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.9"
      },
      {
        "model": "s3 med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3005"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.0.0.0"
      },
      {
        "model": "smart-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "2010"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1017030"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "14.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "16.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "17.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "debian linux",
        "version": "8.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "debian linux",
        "version": "9.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "10.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "11.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "leap",
        "version": "42.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "leap",
        "version": "42.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux desktop",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux server",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.7.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.7.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux point of sale",
        "version": "11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux server",
        "version": "12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "openstack cloud",
        "version": "6"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "aa0be958-12f8-4c92-ba4f-8046a72e7fe0"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13087"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:canonical:ubuntu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:debian:debian_linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:freebsd:freebsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:opensuse_project:leap",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:suse:linux_enterprise_desktop",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:suse:suse_linux_enterprise_point_of_sale",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:suse:linux_enterprise_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:suse:openstack_cloud",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:w1.fi:hostapd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:w1.fi:wpa_supplicant",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:nec:nec_edge_gateway",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:sr-m20ac1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:sr-m20ac2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mathy Vanhoef from imec-DistriNet and KU Leuven.",
    "sources": [
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2017-13087",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 5.5,
            "id": "CVE-2017-13087",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.9,
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "CNVD-2017-30398",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "aa0be958-12f8-4c92-ba4f-8046a72e7fe0",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.6,
            "id": "CVE-2017-13087",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-13087",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-13087",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-30398",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201710-388",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "aa0be958-12f8-4c92-ba4f-8046a72e7fe0",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-13087",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "aa0be958-12f8-4c92-ba4f-8046a72e7fe0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13087"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13087"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or \"KRACK\" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). A group key reload vulnerability exists in WPA2 wireless network sleep mode. WPA2  is prone to multiple security weaknesses. \nExploiting these issues may allow an unauthorized user to intercept and manipulate data or disclose sensitive information. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: wpa_supplicant security update\nAdvisory ID:       RHSA-2017:2907-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2017:2907\nIssue date:        2017-10-17\nCVE Names:         CVE-2017-13077 CVE-2017-13078 CVE-2017-13080 \n                   CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 \n                   CVE-2017-13088 \n=====================================================================\n\n1. Summary:\n\nAn update for wpa_supplicant is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe wpa_supplicant packages contain an 802.1X Supplicant with support for\nWEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication\nmethods. They implement key negotiation with a WPA Authenticator for client\nstations and controls the roaming and IEEE 802.11 authentication and\nassociation of the WLAN driver. A remote attacker within Wi-Fi range\ncould exploit these attacks to decrypt Wi-Fi traffic or possibly inject\nforged Wi-Fi packets by manipulating cryptographic handshakes used by the\nWPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080,\nCVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)\n\nRed Hat would like to thank CERT for reporting these issues. Upstream\nacknowledges Mathy Vanhoef (University of Leuven) as the original reporter\nof these issues. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\naarch64:\nwpa_supplicant-2.6-5.el7_4.1.aarch64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.aarch64.rpm\n\nppc64:\nwpa_supplicant-2.6-5.el7_4.1.ppc64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64.rpm\n\nppc64le:\nwpa_supplicant-2.6-5.el7_4.1.ppc64le.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64le.rpm\n\ns390x:\nwpa_supplicant-2.6-5.el7_4.1.s390x.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.s390x.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-13077\nhttps://access.redhat.com/security/cve/CVE-2017-13078\nhttps://access.redhat.com/security/cve/CVE-2017-13080\nhttps://access.redhat.com/security/cve/CVE-2017-13082\nhttps://access.redhat.com/security/cve/CVE-2017-13086\nhttps://access.redhat.com/security/cve/CVE-2017-13087\nhttps://access.redhat.com/security/cve/CVE-2017-13088\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/kracks\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. Those vulnerabilities applies to both the access point\n(implemented in hostapd) and the station (implemented in wpa_supplicant). \n\nAn attacker exploiting the vulnerabilities could force the vulnerable system to\nreuse cryptographic session keys, enabling a range of cryptographic attacks\nagainst the ciphers used in WPA1 and WPA2. \n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 2:2.4-1+deb9u1. \n\nFor the testing distribution (buster), these problems have been fixed\nin version 2:2.4-1.1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2:2.4-1.1. \n\nWe recommend that you upgrade your wpa packages. ==========================================================================\nUbuntu Security Notice USN-3455-1\nOctober 16, 2017\n\nwpa vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 17.04\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in wpa_supplicant. \n\nSoftware Description:\n- wpa: client support for WPA and WPA2\n\nDetails:\n\nMathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly\nhandled WPA2. (CVE-2017-13077,\nCVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081,\nCVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)\n\nImre Rad discovered that wpa_supplicant and hostapd incorrectly handled\ninvalid characters in passphrase parameters. A remote attacker could use\nthis issue to cause a denial of service. (CVE-2016-4476)\n\nImre Rad discovered that wpa_supplicant and hostapd incorrectly handled\ninvalid characters in passphrase parameters. A local attacker could use\nthis issue to cause a denial of service, or possibly execute arbitrary\ncode. (CVE-2016-4477)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 17.04:\n  hostapd                         2.4-0ubuntu9.1\n  wpasupplicant                   2.4-0ubuntu9.1\n\nUbuntu 16.04 LTS:\n  hostapd                         2.4-0ubuntu6.2\n  wpasupplicant                   2.4-0ubuntu6.2\n\nUbuntu 14.04 LTS:\n  hostapd                         2.1-0ubuntu1.5\n  wpasupplicant                   2.1-0ubuntu1.5\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. 6) - i386, x86_64\n\n3. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz:  Upgraded. \n  This update includes patches to mitigate the WPA2 protocol issues known\n  as \"KRACK\" (Key Reinstallation AttaCK), which may be used to decrypt data,\n  hijack TCP connections, and to forge and inject packets. \n  CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT)\n    Reassociation Request and reinstalling the pairwise encryption key (PTK-TK)\n    while processing it. \n  For more information, see:\n    https://www.krackattacks.com/\n    https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088\n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.0 package:\nd8ecfaadb50b3547967ab53733ffc019  wpa_supplicant-2.6-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\nf25216d28800504ce498705da7c9a825  wpa_supplicant-2.6-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n15c61050e4bab2581757befd86be74c0  wpa_supplicant-2.6-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n49fd537a520338744f7757615556d352  wpa_supplicant-2.6-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\nc5539f40c8510af89be92945f0f80185  wpa_supplicant-2.6-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n4c527ff84fcdfd7839f217bbce2e4ae4  wpa_supplicant-2.6-x86_64-1_slack14.2.txz\n\nSlackware -current package:\n28bd88a54e96368f7a7020c1f5fb67fe  n/wpa_supplicant-2.6-i586-2.txz\n\nSlackware x86_64 -current package:\n464fc6b48d1ac077f47e9a3a8534c160  n/wpa_supplicant-2.6-x86_64-2.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-17:07.wpa                                        Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          WPA2 protocol vulnerability\n\nCategory:       contrib\nModule:         wpa\nAnnounced:      2017-10-16\nCredits:        Mathy Vanhoef\nAffects:        All supported versions of FreeBSD. \nCorrected:      2017-10-17 17:30:18 UTC (stable/11, 11.1-STABLE)\n                2017-10-17 17:57:18 UTC (releng/11.1, 11.1-RELEASE-p2)\n                2017-10-17 17:56:03 UTC (releng/11.0, 11.0-RELEASE-p13)\n                2017-10-19 03:18:22 UTC (stable/10, 10.4-STABLE)\n                2017-10-19 03:20:17 UTC (releng/10.4, 10.4-RELEASE-p1)\n                2017-10-19 03:19:42 UTC (releng/10.3, 10.3-RELEASE-p22)\nCVE Name:       CVE-2017-13077, CVE-2017-13078, CVE-2017-13079,\n                CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,\n                CVE-2017-13086, CVE-2017-13087, CVE-2017-13088\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:https://security.FreeBSD.org/\u003e. \n\n0.   Revision history\n\nv1.0  2017-10-17 Initial release. \nv1.1  2017-10-19 Add patches for 10.x releases. \n\nI. \n\nhostapd and wpa_supplicant are implementations of user space daemon for\naccess points and wireless client that implements the WPA2 protocol. \n\nII.  Problem Description\n\nA vulnerability was found in how a number of implementations can be\ntriggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by\nreplaying a specific frame that is used to manage the keys. \n\nIII. Impact\n\nSuch reinstallation of the encryption key can result in two different\ntypes of vulnerabilities: disabling replay protection and significantly\nreducing the security of encryption to the point of allowing frames to\nbe decrypted or some parts of the keys to be determined by an attacker\ndepending on which cipher is used. \n\nIV.  Workaround\n\nAn updated version of wpa_supplicant is available in the FreeBSD Ports\nCollection. Install version 2.6_2 or later of the\nsecurity/wpa_supplicant port/pkg. Once installed, update /etc/rc.conf\nto use the new binary:\n\nwpa_supplicant_program=\"/usr/local/sbin/wpa_supplicant\"\n\nand restart networking. \n\nAn updated version of hostapd is available in the FreeBSD Ports\nCollection. Install version 2.6_1 or later of the net/hostapd port/pkg. \nOnce installed, update /etc/rc.conf to use the new binary:\n\nhostapd_program=\"/usr/local/sbin/hostapd\"\n\nand restart hostapd. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\nRestart the Wi-Fi network interfaces/hostapd or reboot the system. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nRestart the Wi-Fi network interfaces/hostapd or reboot the system. \n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 11.0-RELEASE, 11.1-RELEASE, and 11-STABLE]\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch.asc\n# gpg --verify wpa-11.patch.asc\n\n[FreeBSD 10.3-RELEASE, 10.4-RELEASE, and 10-STABLE]\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch.asc\n# gpg --verify wpa-10.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in \u003cURL:https://www.FreeBSD.org/handbook/makeworld.html\u003e. \n\nRestart the applicable daemons, or reboot the system. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/11/                                                        r324697\nreleng/11.0/                                                      r324698\nreleng/11.1/                                                      r324699\nstable/10/                                                        r324739\nreleng/10.3/                                                      r324740\nreleng/10.4/                                                      r324741\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n\u003cURL:https://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\u003e\n\nVII. References\n\n\u003cURL:https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\u003e\n\u003cURL:https://www.krackattacks.com/\u003e\n\nThe latest revision of this advisory is available at\n\u003cURL:https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc\u003e\n-----BEGIN PGP SIGNATURE-----\n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\nETx2QOZgKnCs2oDNiw4aQHb7kvi2w94Iw/R1sAPkkxYJWO3reyE=\n=h/5q\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-13087"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "IVD",
        "id": "aa0be958-12f8-4c92-ba4f-8046a72e7fe0"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13087"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144659"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      }
    ],
    "trust": 3.96
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-13087",
        "trust": 4.2
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519",
        "trust": 4.2
      },
      {
        "db": "BID",
        "id": "101274",
        "trust": 2.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-17420",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1039577",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039576",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039581",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039578",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039573",
        "trust": 1.7
      },
      {
        "db": "SIEMENS",
        "id": "SSA-901333",
        "trust": 1.7
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2017-005",
        "trust": 1.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-18-114-01",
        "trust": 1.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-029-01",
        "trust": 1.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-353-02",
        "trust": 1.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-01",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30398",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-388",
        "trust": 0.8
      },
      {
        "db": "JUNIPER",
        "id": "JSA10827",
        "trust": 0.8
      },
      {
        "db": "DLINK",
        "id": "SAP10075",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-02A",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU90609033",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009178",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4125",
        "trust": 0.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-299-02",
        "trust": 0.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-02",
        "trust": 0.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-325-01",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "AA0BE958-12F8-4C92-BA4F-8046A72E7FE0",
        "trust": 0.2
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13087",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144652",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144630",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144632",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144659",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144663",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144669",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "aa0be958-12f8-4c92-ba4f-8046a72e7fe0"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13087"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144659"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13087"
      }
    ]
  },
  "id": "VAR-201710-0974",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "aa0be958-12f8-4c92-ba4f-8046a72e7fe0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      }
    ],
    "trust": 1.400319345
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "aa0be958-12f8-4c92-ba4f-8046a72e7fe0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      }
    ]
  },
  "last_update_date": "2025-12-22T23:36:17.894000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "ARUBA-PSA-2017-007",
        "trust": 0.8,
        "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt"
      },
      {
        "title": "DSA-3999",
        "trust": 0.8,
        "url": "https://www.debian.org/security/2017/dsa-3999"
      },
      {
        "title": "FreeBSD-SA-17:07.wpa",
        "trust": 0.8,
        "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-17:07.wpa.asc"
      },
      {
        "title": "LEN-17420",
        "trust": 0.8,
        "url": "https://support.lenovo.com/jp/en/product_security/len-17420"
      },
      {
        "title": "NV17-024",
        "trust": 0.8,
        "url": "http://jpn.nec.com/security-info/secinfo/nv17-024.html"
      },
      {
        "title": "openSUSE-SU-2017:2755",
        "trust": 0.8,
        "url": "https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
      },
      {
        "title": "SUSE-SU-2017:2745",
        "trust": 0.8,
        "url": "https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
      },
      {
        "title": "SUSE-SU-2017:2752",
        "trust": 0.8,
        "url": "https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
      },
      {
        "title": "KRACKs - wpa_supplicant Multiple Vulnerabilities",
        "trust": 0.8,
        "url": "https://access.redhat.com/security/vulnerabilities/kracks"
      },
      {
        "title": "RHSA-2017:2907",
        "trust": 0.8,
        "url": "https://access.redhat.com/errata/RHSA-2017:2907"
      },
      {
        "title": "RHSA-2017:2911",
        "trust": 0.8,
        "url": "https://access.redhat.com/errata/RHSA-2017:2911"
      },
      {
        "title": "USN-3455-1",
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/usn/USN-3455-1/"
      },
      {
        "title": "WPA packet number reuse with replayed messages and key reinstallation",
        "trust": 0.8,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt"
      },
      {
        "title": "Wi-Fi\u306e\u8a8d\u8a3c\uff0f\u6697\u53f7\u5316\u6280\u8853WPA2\u304a\u3088\u3073WPA\u306e\u8907\u6570\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066  ",
        "trust": 0.8,
        "url": "http://www.fujitsu.com/jp/products/network/support/2017/srm-01/index.html"
      },
      {
        "title": "WPA2\u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u5f0a\u793e\u8abf\u67fb\u30fb\u5bfe\u5fdc\u72b6\u6cc1\u306b\u3064\u3044\u3066",
        "trust": 0.8,
        "url": "http://www.iodata.jp/support/information/2017/wpa2/"
      },
      {
        "title": "\u7121\u7ddaLAN \u8a8d\u8a3c\uff0f\u6697\u53f7\u5316\u6280\u8853WPA2\u304a\u3088\u3073WPA\u306b\u95a2\u3059\u308b\u8106\u5f31\u6027\u306e\u304a\u77e5\u3089\u305b ",
        "trust": 0.8,
        "url": "http://www.fmworld.net/biz/common/info/20171110/"
      },
      {
        "title": "Patch for WPA2 Wireless Network Sleep Mode Group Key Reload Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/103826"
      },
      {
        "title": "Multiple WiFi product WPA2 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75502"
      },
      {
        "title": "Red Hat: Important: wpa_supplicant security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172911 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: wpa_supplicant security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172907 - Security Advisory"
      },
      {
        "title": "Red Hat: CVE-2017-13087",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2017-13087"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-13087"
      },
      {
        "title": "Ubuntu Security Notice: wpa vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3455-1"
      },
      {
        "title": "Debian Security Advisories: DSA-3999-1 wpa -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=08990d9925276738bd732fa4d58f9ef0"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-23] hostapd: man-in-the-middle",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-23"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-22] wpa_supplicant: man-in-the-middle",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-22"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=6df91267eee9400a24a98876f50ffe84"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014November 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=8c29eb008bb212762e5cfb25c7c5c0d5"
      },
      {
        "title": "Cisco: Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20171016-wpa"
      },
      {
        "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=7251d5e5f2b1771951980ad7cfde50ba"
      },
      {
        "title": "KRACK",
        "trust": 0.1,
        "url": "https://github.com/chinatso/KRACK "
      },
      {
        "title": "krackinfo",
        "trust": 0.1,
        "url": "https://github.com/kristate/krackinfo "
      },
      {
        "title": "nixos-issue-db-example",
        "trust": 0.1,
        "url": "https://github.com/andir/nixos-issue-db-example "
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2017/11/07/android_november_security_update/"
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2017/10/16/wpa2_inscure_krackattack/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13087"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-330",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-254",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13087"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.7,
        "url": "https://www.krackattacks.com/"
      },
      {
        "trust": 3.3,
        "url": "https://source.android.com/security/bulletin/2017-11-01"
      },
      {
        "trust": 2.9,
        "url": "http://www.securityfocus.com/bid/101274"
      },
      {
        "trust": 2.8,
        "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-007.txt"
      },
      {
        "trust": 2.8,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171016-wpa"
      },
      {
        "trust": 2.7,
        "url": "https://access.redhat.com/security/vulnerabilities/kracks"
      },
      {
        "trust": 2.5,
        "url": "http://www.debian.org/security/2017/dsa-3999"
      },
      {
        "trust": 2.2,
        "url": "https://access.redhat.com/errata/rhsa-2017:2911"
      },
      {
        "trust": 2.1,
        "url": "http://www.kb.cert.org/vuls/id/228519"
      },
      {
        "trust": 2.1,
        "url": "https://access.redhat.com/errata/rhsa-2017:2907"
      },
      {
        "trust": 1.8,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt"
      },
      {
        "trust": 1.8,
        "url": "http://www.ubuntu.com/usn/usn-3455-1"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039581"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039578"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039577"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039576"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039573"
      },
      {
        "trust": 1.7,
        "url": "https://support.lenovo.com/us/en/product_security/len-17420"
      },
      {
        "trust": 1.7,
        "url": "https://security.freebsd.org/advisories/freebsd-sa-17:07.wpa.asc"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
      },
      {
        "trust": 1.7,
        "url": "https://security.gentoo.org/glsa/201711-03"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2017-005"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13087"
      },
      {
        "trust": 1.2,
        "url": "https://ics-cert.us-cert.gov/advisories/icsma-18-114-01"
      },
      {
        "trust": 1.1,
        "url": "https://papers.mathyvanhoef.com/ccs2017.pdf"
      },
      {
        "trust": 1.1,
        "url": "https://w1.fi/security/2017-1/"
      },
      {
        "trust": 1.1,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00101\u0026languageid=en-fr"
      },
      {
        "trust": 1.1,
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-13080"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-353-02"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-01"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsma-19-029-01"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13087"
      },
      {
        "trust": 0.8,
        "url": "https://cwe.mitre.org/data/definitions/323.html"
      },
      {
        "trust": 0.8,
        "url": "https://actiontecsupport.zendesk.com/hc/en-us/articles/115005205283-krack-vulnerability"
      },
      {
        "trust": 0.8,
        "url": "https://www3.aerohive.com/support/security-bulletins/product-security-announcement-aerohives-response-to-krack-10162017.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.al-enterprise.com/en/support/security-alert-krack"
      },
      {
        "trust": 0.8,
        "url": "https://support.apple.com/en-gb/ht208222"
      },
      {
        "trust": 0.8,
        "url": "https://security.archlinux.org/avg-447"
      },
      {
        "trust": 0.8,
        "url": "https://www.asus.com/static_webpage/asus-product-security-advisory/"
      },
      {
        "trust": 0.8,
        "url": "https://community.barracudanetworks.com/forum/index.php?/topic/23525-security-advisories/page-2"
      },
      {
        "trust": 0.8,
        "url": "https://lists.centos.org/pipermail/centos-announce/2017-october/022569.html"
      },
      {
        "trust": 0.8,
        "url": "https://community.cypress.com/docs/doc-13871"
      },
      {
        "trust": 0.8,
        "url": "http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10075"
      },
      {
        "trust": 0.8,
        "url": "http://www.dell.com/support/article/sln307822"
      },
      {
        "trust": 0.8,
        "url": "https://github.com/espressif/esp8266_nonos_sdk"
      },
      {
        "trust": 0.8,
        "url": "https://extremeportal.force.com/extrarticledetail?n=000018005"
      },
      {
        "trust": 0.8,
        "url": "https://bodhi.fedoraproject.org/updates/fedora-2017-60bfb576b7"
      },
      {
        "trust": 0.8,
        "url": "http://www.fortiguard.com/psirt/fg-ir-17-196"
      },
      {
        "trust": 0.8,
        "url": "https://www.freebsd.org/security/advisories/freebsd-sa-17:07.wpa.asc"
      },
      {
        "trust": 0.8,
        "url": "https://bugs.gentoo.org/634440"
      },
      {
        "trust": 0.8,
        "url": "https://support.hpe.com/hpsc/doc/public/display?sp4ts.oid=null\u0026doclocale=en_us\u0026docid=emr_na-a00029151en_us"
      },
      {
        "trust": 0.8,
        "url": "https://kb.juniper.net/jsa10827"
      },
      {
        "trust": 0.8,
        "url": "https://support.lenovo.com/ca/en/product_security/len-17420"
      },
      {
        "trust": 0.8,
        "url": "http://www.microchip.com/wwwproducts/en/atwinc1500"
      },
      {
        "trust": 0.8,
        "url": "http://mail-index.netbsd.org/source-changes/2017/10/16/msg088877.html"
      },
      {
        "trust": 0.8,
        "url": "https://kb.netgear.com/000049498/security-advisory-for-wpa-2-vulnerabilities-psv-2017-2826-psv-2017-2836-psv-2017-2837"
      },
      {
        "trust": 0.8,
        "url": "https://forum.peplink.com/t/security-advisory-wpa2-vulnerability-vu-228519/12715"
      },
      {
        "trust": 0.8,
        "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-101617-v1.0.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://www.suse.com/de-de/support/kb/doc/?id=7022107"
      },
      {
        "trust": 0.8,
        "url": "https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---wpa-and-wpa2-vulnerabilities/"
      },
      {
        "trust": 0.8,
        "url": "http://www.slackware.com/changelog/stable.php?cpu=x86_64"
      },
      {
        "trust": 0.8,
        "url": "https://community.sophos.com/kb/en-us/127658"
      },
      {
        "trust": 0.8,
        "url": "https://www.toshibacommerce.com/wps/myportal/%21ut/p/a1/rzrnc8igeiz_sw8egqhjcdmmwr8abw2dqcnfoyqotidrrk399uxrrwotuzgws7a87y6z88iuzmcq2u4uwcnlzypjnjj5-exr_wnhya-laxtrid-j3uchdtb8gylmuw6qzgktovtowsrrqlrs6-8dbeqhwc1mykqnlabgdjlf1yjvn7i5af4qtdwsn2tri7j"
      },
      {
        "trust": 0.8,
        "url": "http://www.toshiba-personalstorage.net/en/news/hdd/ot_notice/20171017.htm"
      },
      {
        "trust": 0.8,
        "url": "http://support.toshiba.com/support/staticcontentdetail?contentid=4015875\u0026isfromtoclink=false"
      },
      {
        "trust": 0.8,
        "url": "https://community.ubnt.com/t5/unifi-updates-blog/firmware-3-9-3-7537-for-uap-usw-has-been-released/ba-p/2099365"
      },
      {
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/usn/usn-3455-1/"
      },
      {
        "trust": 0.8,
        "url": "http://en.miui.com/thread-954223-1-1.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.zebra.com/content/dam/zebra_new_ia/en-us/support-and-downloads/lifeguard-security/krack-security-bulletin.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://www.zyxel.com/support/announcement_wpa2_key_management.shtml"
      },
      {
        "trust": 0.8,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk120938"
      },
      {
        "trust": 0.8,
        "url": "https://community.rsa.com/docs/doc-84103"
      },
      {
        "trust": 0.8,
        "url": "https://support.f5.com/csp/article/k23642330"
      },
      {
        "trust": 0.8,
        "url": "https://forum.mikrotik.com/viewtopic.php?f=21\u0026t=126695"
      },
      {
        "trust": 0.8,
        "url": "https://community.linksys.com/t5/wireless-routers/krack-vulnerability/td-p/1218573"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-02a"
      },
      {
        "trust": 0.8,
        "url": "https://www.ipa.go.jp/security/ciadr/vul/20171017_wpa2.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu90609033/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.kb.cert.org/vuls/id/cheu-aqnmyp"
      },
      {
        "trust": 0.6,
        "url": "https://www.kb.cert.org/vuls/id/228519/"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13078"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13077"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13080"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4125/"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2017-13077"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2017-13078"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2017-13080"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2017-13087"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13082"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13086"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13088"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13082"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13086"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13088"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13081"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13079"
      },
      {
        "trust": 0.3,
        "url": "https://github.com/stevenhoneyman/wpa_gui/tree/master/wpa_supplicant-2.4"
      },
      {
        "trust": 0.3,
        "url": "http://www.wi-fi.org/index.php"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-ie/ht208847"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208334"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208327"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208325"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2017/dec/msg00009.html"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2017/dec/msg00008.html"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2018/jul/msg00000.html"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13079"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13081"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13084"
      },
      {
        "trust": 0.3,
        "url": "http://docs.fortinet.com/uploaded/files/3961/fortiap-v5.6.1-release-notes.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-299-02"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-02"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-325-01"
      },
      {
        "trust": 0.3,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.2,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/330.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/kristate/krackinfo"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4476"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4477"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2.1-0ubuntu1.5"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu9.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu6.2"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13078"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13080"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13082"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13077"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13081"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13084"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com/gpg-key"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13086"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13088"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13079"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13084"
      },
      {
        "trust": 0.1,
        "url": "http://osuosl.org)"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-10.patch.asc"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/advisories/freebsd-sa-17:07.wpa.asc\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://www.krackattacks.com/\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-11.patch.asc"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/\u003e."
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-11.patch"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-10.patch"
      },
      {
        "trust": 0.1,
        "url": "https://www.freebsd.org/handbook/makeworld.html\u003e."
      },
      {
        "trust": 0.1,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\u003e"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13087"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144659"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13087"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "aa0be958-12f8-4c92-ba4f-8046a72e7fe0"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13087"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144659"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13087"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-10-17T00:00:00",
        "db": "IVD",
        "id": "aa0be958-12f8-4c92-ba4f-8046a72e7fe0"
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "date": "2017-10-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-13087"
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "BID",
        "id": "101274"
      },
      {
        "date": "2017-10-17T16:52:00",
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "date": "2017-10-16T13:49:34",
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "date": "2017-10-16T23:23:00",
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "date": "2017-10-18T20:20:00",
        "db": "PACKETSTORM",
        "id": "144659"
      },
      {
        "date": "2017-10-18T20:44:00",
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "date": "2017-10-19T14:28:55",
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      },
      {
        "date": "2017-11-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      },
      {
        "date": "2017-10-17T13:29:00.600000",
        "db": "NVD",
        "id": "CVE-2017-13087"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "date": "2017-10-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-30398"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-13087"
      },
      {
        "date": "2019-02-21T09:00:00",
        "db": "BID",
        "id": "101274"
      },
      {
        "date": "2020-11-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      },
      {
        "date": "2019-02-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-009178"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2017-13087"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "security feature problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-388"
      }
    ],
    "trust": 0.6
  }
}

VAR-201710-0211

Vulnerability from variot - Updated: 2025-12-22 22:45

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or "KRACK" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). The WPA2 wireless network has a GTK group key reload vulnerability in the fourth handshake. WPA2 is prone to multiple security weaknesses. Exploiting these issues may allow an unauthorized user to intercept and manipulate data or disclose sensitive information. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: wpa_supplicant security update Advisory ID: RHSA-2017:2907-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2907 Issue date: 2017-10-17 CVE Names: CVE-2017-13077 CVE-2017-13078 CVE-2017-13080 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 =====================================================================

  1. Summary:

An update for wpa_supplicant is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64

  1. Description:

The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)

Red Hat would like to thank CERT for reporting these issues. Upstream acknowledges Mathy Vanhoef (University of Leuven) as the original reporter of these issues. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

aarch64: wpa_supplicant-2.6-5.el7_4.1.aarch64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.aarch64.rpm

ppc64: wpa_supplicant-2.6-5.el7_4.1.ppc64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64.rpm

ppc64le: wpa_supplicant-2.6-5.el7_4.1.ppc64le.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64le.rpm

s390x: wpa_supplicant-2.6-5.el7_4.1.s390x.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.s390x.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2017-13077 https://access.redhat.com/security/cve/CVE-2017-13078 https://access.redhat.com/security/cve/CVE-2017-13080 https://access.redhat.com/security/cve/CVE-2017-13082 https://access.redhat.com/security/cve/CVE-2017-13086 https://access.redhat.com/security/cve/CVE-2017-13087 https://access.redhat.com/security/cve/CVE-2017-13088 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/kracks

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

APPLE-SA-2017-12-12-2 AirPort Base Station Firmware Update 7.7.9

AirPort Base Station Firmware Update 7.7.9 is now available and addresses the following:

AirPort Base Station Firmware Available for: AirPort Extreme and AirPort Time Capsule base stations with 802.11ac Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-9417: Nitay Artenstein of Exodus Intelligence

AirPort Base Station Firmware Available for: AirPort Extreme and AirPort Time Capsule base stations with 802.11ac Impact: An attacker in Wi-Fi range may force nonce reuse in WPA unicast/PTK clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management. CVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at KU Leuven CVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at KU Leuven

AirPort Base Station Firmware Available for: AirPort Extreme and AirPort Time Capsule base stations with 802.11ac Impact: An attacker in Wi-Fi range may force nonce reuse in WPA multicast/GTK clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management. CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven

Installation note:

Firmware version 7.7.9 is installed on AirPort Extreme or AirPort Time Capsule base stations with 802.11ac using AirPort Utility for Mac or iOS.

AirPort Utility for Mac is a free download from https://support.apple.com/downloads/ and AirPort Utility for iOS is a free download from the App Store. Those vulnerabilities applies to both the access point (implemented in hostapd) and the station (implemented in wpa_supplicant).

An attacker exploiting the vulnerabilities could force the vulnerable system to reuse cryptographic session keys, enabling a range of cryptographic attacks against the ciphers used in WPA1 and WPA2.

For the stable distribution (stretch), these problems have been fixed in version 2:2.4-1+deb9u1.

For the testing distribution (buster), these problems have been fixed in version 2:2.4-1.1.

For the unstable distribution (sid), these problems have been fixed in version 2:2.4-1.1.

We recommend that you upgrade your wpa packages. ========================================================================== Ubuntu Security Notice USN-3455-1 October 16, 2017

wpa vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in wpa_supplicant.

Software Description: - wpa: client support for WPA and WPA2

Details:

Mathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly handled WPA2. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)

Imre Rad discovered that wpa_supplicant and hostapd incorrectly handled invalid characters in passphrase parameters. A remote attacker could use this issue to cause a denial of service. (CVE-2016-4476)

Imre Rad discovered that wpa_supplicant and hostapd incorrectly handled invalid characters in passphrase parameters. A local attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. (CVE-2016-4477)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.04: hostapd 2.4-0ubuntu9.1 wpasupplicant 2.4-0ubuntu9.1

Ubuntu 16.04 LTS: hostapd 2.4-0ubuntu6.2 wpasupplicant 2.4-0ubuntu6.2

Ubuntu 14.04 LTS: hostapd 2.1-0ubuntu1.5 wpasupplicant 2.1-0ubuntu1.5

After a standard system update you need to reboot your computer to make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201711-03


                                       https://security.gentoo.org/

Severity: Normal Title: hostapd and wpa_supplicant: Key Reinstallation (KRACK) attacks Date: November 10, 2017 Bugs: #634436, #634438 ID: 201711-03


Synopsis

A flaw was discovered in the 4-way handshake in hostapd and wpa_supplicant that allows attackers to conduct a Man in the Middle attack.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 net-wireless/hostapd < 2.6-r1 >= 2.6-r1 2 net-wireless/wpa_supplicant < 2.6-r3 >= 2.6-r3 ------------------------------------------------------------------- 2 affected packages

Description

WiFi Protected Access (WPA and WPA2) and it's associated technologies are all vulnerable to the KRACK attacks. Please review the referenced CVE identifiers for details.

Impact

An attacker can carry out the KRACK attacks on a wireless network in order to gain access to network clients. Once achieved, the attacker can potentially harvest confidential information (e.g. HTTP/HTTPS), inject malware, or perform a myriad of other attacks.

Workaround

There is no known workaround at this time.

Resolution

All hostapd users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.6-r1"

All wpa_supplicant users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot -v ">=net-wireless/wpa_supplicant-2.6-r3"

References

[ 1 ] CVE-2017-13077 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13077 [ 2 ] CVE-2017-13078 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13078 [ 3 ] CVE-2017-13079 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13079 [ 4 ] CVE-2017-13080 . 6) - i386, x86_64

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

============================================================================= FreeBSD-SA-17:07.wpa Security Advisory The FreeBSD Project

Topic: WPA2 protocol vulnerability

Category: contrib Module: wpa Announced: 2017-10-16 Credits: Mathy Vanhoef Affects: All supported versions of FreeBSD. Corrected: 2017-10-17 17:30:18 UTC (stable/11, 11.1-STABLE) 2017-10-17 17:57:18 UTC (releng/11.1, 11.1-RELEASE-p2) 2017-10-17 17:56:03 UTC (releng/11.0, 11.0-RELEASE-p13) 2017-10-19 03:18:22 UTC (stable/10, 10.4-STABLE) 2017-10-19 03:20:17 UTC (releng/10.4, 10.4-RELEASE-p1) 2017-10-19 03:19:42 UTC (releng/10.3, 10.3-RELEASE-p22) CVE Name: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .

  1. Revision history

v1.0 2017-10-17 Initial release. v1.1 2017-10-19 Add patches for 10.x releases.

I.

hostapd and wpa_supplicant are implementations of user space daemon for access points and wireless client that implements the WPA2 protocol.

II. Problem Description

A vulnerability was found in how a number of implementations can be triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by replaying a specific frame that is used to manage the keys.

III. Impact

Such reinstallation of the encryption key can result in two different types of vulnerabilities: disabling replay protection and significantly reducing the security of encryption to the point of allowing frames to be decrypted or some parts of the keys to be determined by an attacker depending on which cipher is used.

IV. Workaround

An updated version of wpa_supplicant is available in the FreeBSD Ports Collection. Install version 2.6_2 or later of the security/wpa_supplicant port/pkg. Once installed, update /etc/rc.conf to use the new binary:

wpa_supplicant_program="/usr/local/sbin/wpa_supplicant"

and restart networking.

An updated version of hostapd is available in the FreeBSD Ports Collection. Install version 2.6_1 or later of the net/hostapd port/pkg. Once installed, update /etc/rc.conf to use the new binary:

hostapd_program="/usr/local/sbin/hostapd"

and restart hostapd.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

Restart the Wi-Fi network interfaces/hostapd or reboot the system.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

Restart the Wi-Fi network interfaces/hostapd or reboot the system.

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 11.0-RELEASE, 11.1-RELEASE, and 11-STABLE]

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch.asc

gpg --verify wpa-11.patch.asc

[FreeBSD 10.3-RELEASE, 10.4-RELEASE, and 10-STABLE]

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch

fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch.asc

gpg --verify wpa-10.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart the applicable daemons, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/11/ r324697 releng/11.0/ r324698 releng/11.1/ r324699 stable/10/ r324739 releng/10.3/ r324740 releng/10.4/ r324741


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEEHPf/b631yp++G4yy7Wfs1l3PaucFAlnoGpNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDFD RjdGRjZGQURGNUNBOUZCRTFCOENCMkVENjdFQ0Q2NURDRjZBRTcACgkQ7Wfs1l3P auc7WBAAm27w+fujv5sJsRxauUMopTVtRh5utwbDuoHTP+L+RCWmQfVBmueNQ0gf uJzMNxBIkbtY9LvyukpRsH3iD7mh26c0pd9rxxkkr4F96C9B5+W0amxJF1gdm54/ F/50FpY+lo7cNs5tiBjypPrg8UOBBI/1G4XR7130XC0HjaTwt1ngZ0oQUWUMSsIp gN5ZfPul81WPWd1NqF+vyObcJhwq/Y1uoexoO27o7GQCFZoL3enZy8c4f1xqMlVM 4HHkTgNGac6E0aW+ArH4J0DFFAOJXPqF8rdt+9XINfoBbtliIyOixJ4oh1n6eAR0 VpBWZKFNyXSlUKIvDGa+LDhxgL1jJXV0ABSyKlUOijdmr3bbbiQE9MW/MNv2AFTd OAFQ0QQtm9KCWp5JLh+FPIb/kR2l7MOUP+yz4zFcJpdGtl9tDLyPN8vRTq60bY8O y7tBcf/SMqkd/AIFdchL4zrOguKnRARydIlwTarp8wtAQI3MKSsa1B0wgsDtlL6K xfdjnwWMKvKKlNOW16e1WXXO0n/ucHV4njBE+bGPro3jLgXP2/WFZpIGAR3I4xrr SdD4AxSNiR9f3bL7LRfMIbugJAylWNSlTLWUOVUv0/ONh85LqbcCj13NI230B64K ETx2QOZgKnCs2oDNiw4aQHb7kvi2w94Iw/R1sAPkkxYJWO3reyE= =h/5q -----END PGP SIGNATURE----- .

Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz: Upgraded. This update includes patches to mitigate the WPA2 protocol issues known as "KRACK" (Key Reinstallation AttaCK), which may be used to decrypt data, hijack TCP connections, and to forge and inject packets. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. For more information, see: https://www.krackattacks.com/ https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088 ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz

Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz

Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz

MD5 signatures: +-------------+

Slackware 14.0 package: d8ecfaadb50b3547967ab53733ffc019 wpa_supplicant-2.6-i486-1_slack14.0.txz

Slackware x86_64 14.0 package: f25216d28800504ce498705da7c9a825 wpa_supplicant-2.6-x86_64-1_slack14.0.txz

Slackware 14.1 package: 15c61050e4bab2581757befd86be74c0 wpa_supplicant-2.6-i486-1_slack14.1.txz

Slackware x86_64 14.1 package: 49fd537a520338744f7757615556d352 wpa_supplicant-2.6-x86_64-1_slack14.1.txz

Slackware 14.2 package: c5539f40c8510af89be92945f0f80185 wpa_supplicant-2.6-i586-1_slack14.2.txz

Slackware x86_64 14.2 package: 4c527ff84fcdfd7839f217bbce2e4ae4 wpa_supplicant-2.6-x86_64-1_slack14.2.txz

Slackware -current package: 28bd88a54e96368f7a7020c1f5fb67fe n/wpa_supplicant-2.6-i586-2.txz

Slackware x86_64 -current package: 464fc6b48d1ac077f47e9a3a8534c160 n/wpa_supplicant-2.6-x86_64-2.txz

Installation instructions: +------------------------+

Upgrade the package as root:

upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0211",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.10"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.10"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.6.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.11"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.11"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.9"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.5"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "openstack cloud",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "6"
      },
      {
        "model": "linux enterprise desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.9"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "14.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.5"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "*"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.8"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.6"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "10"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.2"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.6"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.5"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.4"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.8"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.1"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.7.3"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.0"
      },
      {
        "model": "linux enterprise point of sale",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.4"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.6"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.7.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "11.1"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.0"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.6"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.4"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.1"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.8"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "42.2"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.7"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "17.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.4"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "10.4"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.1"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.5"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.3"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.8"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.2"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.8"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "42.3"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "9front",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "adtran",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "avm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "actiontec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "aerohive",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "android open source",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "arch linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "aruba",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "asustek computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "barracuda",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cambium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "centos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cradlepoint",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cypress semiconductor",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian gnu linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "digi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "edimax computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "engenius",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "endian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "espressif",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "extreme",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "f secure",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fortinet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "google",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hostap",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ipfire",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "juniper",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lancom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lede",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lifx",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microchip",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mojo",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nest",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netgear",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "opnsense",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "omnirom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "open mesh",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "peplink",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "riverbed",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung mobile",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sonos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sony",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sophos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "synology",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "tp link",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "technicolor",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "texas instruments",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba commerce",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba electronic devices storage",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba memory",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "turris omnia",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubiquiti",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubuntu",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "volumio",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "watchguard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xiaomi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xirrus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zebra",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zyxel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dd wrt",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "eero",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "pfsense",
        "version": null
      },
      {
        "model": "ubuntu",
        "scope": null,
        "trust": 0.8,
        "vendor": "canonical",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "freebsd",
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": "leap",
        "scope": null,
        "trust": 0.8,
        "vendor": "opensuse",
        "version": null
      },
      {
        "model": "linux enterprise desktop",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "linux enterprise point of sale",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "linux enterprise server",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "openstack cloud",
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "hostapd",
        "scope": null,
        "trust": 0.8,
        "vendor": "w1 fi",
        "version": null
      },
      {
        "model": "wpa supplicant",
        "scope": null,
        "trust": 0.8,
        "vendor": "w1 fi",
        "version": null
      },
      {
        "model": "enterprise linux desktop",
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": "enterprise linux server",
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": "edge gateway",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "sr-m20ac1",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": "v02.10"
      },
      {
        "model": "sr-m20ac2",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": "v02.10"
      },
      {
        "model": "alliance wi-fi protected access 2",
        "scope": null,
        "trust": 0.6,
        "vendor": "wi fi",
        "version": null
      },
      {
        "model": "scalance w-700",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "linux desktop",
        "version": "12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "linux server",
        "version": "11"
      },
      {
        "model": "atom processor c3200 series for yocto project bsp mr4",
        "scope": null,
        "trust": 0.3,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.1"
      },
      {
        "model": "pyxis supplystation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "sinamics smart access module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "v200"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6.27.3264"
      },
      {
        "model": "meraki mr34",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ck71a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.2.0"
      },
      {
        "model": "macbook air",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18500"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.0"
      },
      {
        "model": "meraki mr26",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "28000"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "meraki mr84",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "510x0"
      },
      {
        "model": "windows server r2 for itanium-based systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "contact itc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "81130"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.0.0"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "meraki mr18",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "8.1.0.3"
      },
      {
        "model": "scalance w1750d",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "secure ii med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3002"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "210x0"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1015110"
      },
      {
        "model": "aironet access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "contact fl wlan ap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.1"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "wap371 wireless-ac n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ex-handy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "2090"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.2"
      },
      {
        "model": "contact rad-80211-xd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.2"
      },
      {
        "model": "contact fl wlan dap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10.9.1"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.25"
      },
      {
        "model": "pyxis medstation es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "wireless ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88210"
      },
      {
        "model": "pyxis stockstation system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "macbook",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.7.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10.9.2"
      },
      {
        "model": "scalance wlc712",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "contact fl wlan spa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "meraki mr62",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "simatic et200 pro im154-6 pn iwlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "tropos broadband mesh routers and bridges",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "abb",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10.9.2"
      },
      {
        "model": "meraki mr33",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.3"
      },
      {
        "model": "micros handheld terminal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "0"
      },
      {
        "model": "windows server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "20120"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.33.9.2"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1017030"
      },
      {
        "model": "atom processor c3200 series for yocto project bsp mr4.1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "2.6"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.0"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "110x0"
      },
      {
        "model": "windows for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "100"
      },
      {
        "model": "s3 med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3002"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.2.4"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.1"
      },
      {
        "model": "contact fl comserver wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "232/422/4850"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.8"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7."
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.1.91.3272"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2.4.9"
      },
      {
        "model": "contact fl wlan ap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "230802-110"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.1"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "meraki mr14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.5"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18150"
      },
      {
        "model": "wireless client bridge 2.0.0.1-aruba501-b00",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "501"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.33.9.2"
      },
      {
        "model": "airport express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "clarity engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "1.0"
      },
      {
        "model": "meraki mr30h",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "airport extreme",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "windows server r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "20120"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.2.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "8.0"
      },
      {
        "model": "contact bl2 bpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.0.1"
      },
      {
        "model": "enterprise linux for ibm z systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "watch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "w1 f1",
        "version": "2.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "4.0"
      },
      {
        "model": "ruggedcom rx1400",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "cn70a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1015110"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3"
      },
      {
        "model": "pyxis parx handheld",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1.40.100"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1.1"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3"
      },
      {
        "model": "windows rt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.1"
      },
      {
        "model": "meraki mr42",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3.1.6"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.3"
      },
      {
        "model": "wap561 wireless-n dual radio selectable band access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.26.3000"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6"
      },
      {
        "model": "tvos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.0"
      },
      {
        "model": "windows server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2016"
      },
      {
        "model": "contact rad-whg/wlan-xd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.33.9.3"
      },
      {
        "model": "wi-fi update for boot camp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "6.4.0"
      },
      {
        "model": "suremark printer 2nr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.1"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.2"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "enterprise linux for power little endian",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.0.0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.8"
      },
      {
        "model": "windows server for x64-based systems sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "pyxis supply roller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.3"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3"
      },
      {
        "model": "telepresence collaboration endpoint",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.2.61.3535"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "70xx0"
      },
      {
        "model": "imac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr72",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "watchos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.25.3001"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "8.1.0.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.2"
      },
      {
        "model": "meraki mr53",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1"
      },
      {
        "model": "wap551 wireless-n single radio selectable band access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.0.0"
      },
      {
        "model": "wap121 wireless-n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "2.5"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6.0.1000"
      },
      {
        "model": "wireless client bridge 1.0.1.3-hp501-b0012",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "501"
      },
      {
        "model": "i.roc ci70-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.0.0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.2.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.1"
      },
      {
        "model": "cn70e-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.0.0.0"
      },
      {
        "model": "meraki mr24",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "suremark printer 1nr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "50xx0"
      },
      {
        "model": "meraki mr74",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ex-handy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "090"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.4.15"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.7.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.7.20"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.7.1"
      },
      {
        "model": "systems esp32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "espressif",
        "version": "0"
      },
      {
        "model": "watchos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.1"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "micros handheld terminal 2.03.0.0.021r",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "38000"
      },
      {
        "model": "pyxis parx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "dx70",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.1.9"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "intouch critical care bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "2141"
      },
      {
        "model": "pyxis anesthesia es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "aironet series officeextend access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18100"
      },
      {
        "model": "windows for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.10"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10.9.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0.55.3000"
      },
      {
        "model": "windows for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.10"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.0"
      },
      {
        "model": "meraki mr66",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10.9.1"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6"
      },
      {
        "model": "intouch critical care bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "2131"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.2"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18300"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0.0.50.1004"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.1.0"
      },
      {
        "model": "wap321 wireless-n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "simatic iwlan-pb/link",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "aironet 1810w series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "meraki mr52",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "meraki mr12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "airmesh msr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.7.20"
      },
      {
        "model": "watchos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.2"
      },
      {
        "model": "contact fl wlan ec",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2.4.8"
      },
      {
        "model": "systems esp8266",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "espressif",
        "version": "0"
      },
      {
        "model": "tv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "pad-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.0.1205"
      },
      {
        "model": "ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88610"
      },
      {
        "model": "clarity engine",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "1.0.0.1"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "15600"
      },
      {
        "model": "windows for 32-bit systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "7"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3.1.5"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.8"
      },
      {
        "model": "windows for x64-based systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "7"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "meraki mr58",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1016070"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10.9.2"
      },
      {
        "model": "pyxis parassist system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "windows server for 32-bit systems sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.0"
      },
      {
        "model": "simatic mobile panel 277 iwlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "pyxis medstation t2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "40000"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.2.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.0.1"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.0.0"
      },
      {
        "model": "wi-fi update for boot camp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "ipad",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "30xx0"
      },
      {
        "model": "enterprise linux for power big endian",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "w1 f1",
        "version": "2.6"
      },
      {
        "model": "wireless client bridge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "5010"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.0.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.5"
      },
      {
        "model": "meraki mr11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.3"
      },
      {
        "model": "pyxis anesthesia system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "40000"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "pyxis anesthesia system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "35000"
      },
      {
        "model": "automation stratix 15.3 jc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5100"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "pyxis ciisafe workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "??0"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.7"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.0.0"
      },
      {
        "model": "ipad air",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.1"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "enterprise linux for scientific computing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.1.71.3608"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1.41.3024"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.2.1"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "dx80",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.0"
      },
      {
        "model": "contact bl2 ppc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "contact tpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "60130"
      },
      {
        "model": "ipod touch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.1"
      },
      {
        "model": "ck70a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.7.20"
      },
      {
        "model": "macbook pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10"
      },
      {
        "model": "windows for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "100"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.8"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.5"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.4"
      },
      {
        "model": "smart-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.2.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.33.9.3"
      },
      {
        "model": "tab-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.3"
      },
      {
        "model": "iphone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "macmini",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.4.16"
      },
      {
        "model": "contact fl wlan epa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "airport time capsule",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "alliance wpa2 (wi-fi protected access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wi fi",
        "version": "2)0"
      },
      {
        "model": "airport base station",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.9"
      },
      {
        "model": "scalance wlc711",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "ruggedcom rs9xxw",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.15"
      },
      {
        "model": "networks unifi access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubiquiti",
        "version": "0"
      },
      {
        "model": "suremark printer 2cr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88650"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.7"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4"
      },
      {
        "model": "asa 5506w-x w/ firepower services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1016070"
      },
      {
        "model": "airport base station",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.9"
      },
      {
        "model": "s3 med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3005"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.0.0.0"
      },
      {
        "model": "smart-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "2010"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1017030"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "14.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "16.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "17.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "debian linux",
        "version": "8.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "debian linux",
        "version": "9.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "10.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "11.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "leap",
        "version": "42.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "leap",
        "version": "42.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux desktop",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux server",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.7.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.7.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux point of sale",
        "version": "11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux server",
        "version": "12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "openstack cloud",
        "version": "6"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d6bbedba-ffb0-46fc-8b8d-fc2a4fce19b2"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13078"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:canonical:ubuntu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:debian:debian_linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:freebsd:freebsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:opensuse_project:leap",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:suse:linux_enterprise_desktop",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:suse:suse_linux_enterprise_point_of_sale",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:suse:linux_enterprise_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:suse:openstack_cloud",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:w1.fi:hostapd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:w1.fi:wpa_supplicant",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:nec:nec_edge_gateway",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:sr-m20ac1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:sr-m20ac2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mathy Vanhoef from imec-DistriNet and KU Leuven.",
    "sources": [
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2017-13078",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 5.5,
            "id": "CVE-2017-13078",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.9,
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "CNVD-2017-30405",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "d6bbedba-ffb0-46fc-8b8d-fc2a4fce19b2",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.6,
            "id": "CVE-2017-13078",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-13078",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-13078",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-30405",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201710-381",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "d6bbedba-ffb0-46fc-8b8d-fc2a4fce19b2",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-13078",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d6bbedba-ffb0-46fc-8b8d-fc2a4fce19b2"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13078"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13078"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or \"KRACK\" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). The WPA2 wireless network has a GTK group key reload vulnerability in the fourth handshake. WPA2  is prone to multiple security weaknesses. \nExploiting these issues may allow an unauthorized user to intercept and manipulate data or disclose sensitive information. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: wpa_supplicant security update\nAdvisory ID:       RHSA-2017:2907-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2017:2907\nIssue date:        2017-10-17\nCVE Names:         CVE-2017-13077 CVE-2017-13078 CVE-2017-13080 \n                   CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 \n                   CVE-2017-13088 \n=====================================================================\n\n1. Summary:\n\nAn update for wpa_supplicant is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe wpa_supplicant packages contain an 802.1X Supplicant with support for\nWEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication\nmethods. They implement key negotiation with a WPA Authenticator for client\nstations and controls the roaming and IEEE 802.11 authentication and\nassociation of the WLAN driver. A remote attacker within Wi-Fi range\ncould exploit these attacks to decrypt Wi-Fi traffic or possibly inject\nforged Wi-Fi packets by manipulating cryptographic handshakes used by the\nWPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080,\nCVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)\n\nRed Hat would like to thank CERT for reporting these issues. Upstream\nacknowledges Mathy Vanhoef (University of Leuven) as the original reporter\nof these issues. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\naarch64:\nwpa_supplicant-2.6-5.el7_4.1.aarch64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.aarch64.rpm\n\nppc64:\nwpa_supplicant-2.6-5.el7_4.1.ppc64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64.rpm\n\nppc64le:\nwpa_supplicant-2.6-5.el7_4.1.ppc64le.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64le.rpm\n\ns390x:\nwpa_supplicant-2.6-5.el7_4.1.s390x.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.s390x.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-13077\nhttps://access.redhat.com/security/cve/CVE-2017-13078\nhttps://access.redhat.com/security/cve/CVE-2017-13080\nhttps://access.redhat.com/security/cve/CVE-2017-13082\nhttps://access.redhat.com/security/cve/CVE-2017-13086\nhttps://access.redhat.com/security/cve/CVE-2017-13087\nhttps://access.redhat.com/security/cve/CVE-2017-13088\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/kracks\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-12-12-2 AirPort Base Station Firmware Update 7.7.9\n\nAirPort Base Station Firmware Update 7.7.9 is now available and\naddresses the following:\n\nAirPort Base Station Firmware\nAvailable for: AirPort Extreme and AirPort Time Capsule base stations\nwith 802.11ac\nImpact: An attacker within range may be able to execute arbitrary\ncode on the Wi-Fi chip\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-9417: Nitay Artenstein of Exodus Intelligence\n\nAirPort Base Station Firmware\nAvailable for: AirPort Extreme and AirPort Time Capsule base stations\nwith 802.11ac\nImpact: An attacker in Wi-Fi range may force nonce reuse in WPA\nunicast/PTK clients (Key Reinstallation Attacks - KRACK)\nDescription: A logic issue existed in the handling of state\ntransitions. This was addressed with improved state management. \nCVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\nCVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\n\nAirPort Base Station Firmware\nAvailable for: AirPort Extreme and AirPort Time Capsule base stations\nwith 802.11ac\nImpact: An attacker in Wi-Fi range may force nonce reuse in WPA\nmulticast/GTK clients (Key Reinstallation Attacks - KRACK)\nDescription: A logic issue existed in the handling of state\ntransitions. This was addressed with improved state management. \nCVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\n\nInstallation note:\n\nFirmware version 7.7.9 is installed on AirPort Extreme or\nAirPort Time Capsule base stations with 802.11ac using\nAirPort Utility for Mac or iOS. \n\nAirPort Utility for Mac is a free download from\nhttps://support.apple.com/downloads/ and AirPort Utility for iOS\nis a free download from the App Store. Those vulnerabilities applies to both the access point\n(implemented in hostapd) and the station (implemented in wpa_supplicant). \n\nAn attacker exploiting the vulnerabilities could force the vulnerable system to\nreuse cryptographic session keys, enabling a range of cryptographic attacks\nagainst the ciphers used in WPA1 and WPA2. \n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 2:2.4-1+deb9u1. \n\nFor the testing distribution (buster), these problems have been fixed\nin version 2:2.4-1.1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2:2.4-1.1. \n\nWe recommend that you upgrade your wpa packages. ==========================================================================\nUbuntu Security Notice USN-3455-1\nOctober 16, 2017\n\nwpa vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 17.04\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in wpa_supplicant. \n\nSoftware Description:\n- wpa: client support for WPA and WPA2\n\nDetails:\n\nMathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly\nhandled WPA2. (CVE-2017-13077,\nCVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081,\nCVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)\n\nImre Rad discovered that wpa_supplicant and hostapd incorrectly handled\ninvalid characters in passphrase parameters. A remote attacker could use\nthis issue to cause a denial of service. (CVE-2016-4476)\n\nImre Rad discovered that wpa_supplicant and hostapd incorrectly handled\ninvalid characters in passphrase parameters. A local attacker could use\nthis issue to cause a denial of service, or possibly execute arbitrary\ncode. (CVE-2016-4477)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 17.04:\n  hostapd                         2.4-0ubuntu9.1\n  wpasupplicant                   2.4-0ubuntu9.1\n\nUbuntu 16.04 LTS:\n  hostapd                         2.4-0ubuntu6.2\n  wpasupplicant                   2.4-0ubuntu6.2\n\nUbuntu 14.04 LTS:\n  hostapd                         2.1-0ubuntu1.5\n  wpasupplicant                   2.1-0ubuntu1.5\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201711-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: hostapd and wpa_supplicant: Key Reinstallation (KRACK)\n           attacks\n     Date: November 10, 2017\n     Bugs: #634436, #634438\n       ID: 201711-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nA flaw was discovered in the 4-way handshake in hostapd and\nwpa_supplicant that allows attackers to conduct a Man in the Middle\nattack. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  net-wireless/hostapd         \u003c 2.6-r1                  \u003e= 2.6-r1 \n  2  net-wireless/wpa_supplicant\n                                  \u003c 2.6-r3                  \u003e= 2.6-r3 \n    -------------------------------------------------------------------\n     2 affected packages\n\nDescription\n===========\n\nWiFi Protected Access (WPA and WPA2) and it\u0027s associated technologies\nare all vulnerable to the KRACK attacks. Please review the referenced\nCVE identifiers for details. \n\nImpact\n======\n\nAn attacker can carry out the KRACK attacks on a wireless network in\norder to gain access to network clients. Once achieved, the attacker\ncan potentially harvest confidential information (e.g. HTTP/HTTPS),\ninject malware, or perform a myriad of other attacks. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll hostapd users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-wireless/hostapd-2.6-r1\"\n\nAll wpa_supplicant users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot -v \"\u003e=net-wireless/wpa_supplicant-2.6-r3\"\n\nReferences\n==========\n\n[  1 ] CVE-2017-13077\n       https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13077\n[  2 ] CVE-2017-13078\n       https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13078\n[  3 ] CVE-2017-13079\n       https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13079\n[  4 ] CVE-2017-13080\n. 6) - i386, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-17:07.wpa                                        Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          WPA2 protocol vulnerability\n\nCategory:       contrib\nModule:         wpa\nAnnounced:      2017-10-16\nCredits:        Mathy Vanhoef\nAffects:        All supported versions of FreeBSD. \nCorrected:      2017-10-17 17:30:18 UTC (stable/11, 11.1-STABLE)\n                2017-10-17 17:57:18 UTC (releng/11.1, 11.1-RELEASE-p2)\n                2017-10-17 17:56:03 UTC (releng/11.0, 11.0-RELEASE-p13)\n                2017-10-19 03:18:22 UTC (stable/10, 10.4-STABLE)\n                2017-10-19 03:20:17 UTC (releng/10.4, 10.4-RELEASE-p1)\n                2017-10-19 03:19:42 UTC (releng/10.3, 10.3-RELEASE-p22)\nCVE Name:       CVE-2017-13077, CVE-2017-13078, CVE-2017-13079,\n                CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,\n                CVE-2017-13086, CVE-2017-13087, CVE-2017-13088\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:https://security.FreeBSD.org/\u003e. \n\n0.   Revision history\n\nv1.0  2017-10-17 Initial release. \nv1.1  2017-10-19 Add patches for 10.x releases. \n\nI. \n\nhostapd and wpa_supplicant are implementations of user space daemon for\naccess points and wireless client that implements the WPA2 protocol. \n\nII.  Problem Description\n\nA vulnerability was found in how a number of implementations can be\ntriggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by\nreplaying a specific frame that is used to manage the keys. \n\nIII. Impact\n\nSuch reinstallation of the encryption key can result in two different\ntypes of vulnerabilities: disabling replay protection and significantly\nreducing the security of encryption to the point of allowing frames to\nbe decrypted or some parts of the keys to be determined by an attacker\ndepending on which cipher is used. \n\nIV.  Workaround\n\nAn updated version of wpa_supplicant is available in the FreeBSD Ports\nCollection. Install version 2.6_2 or later of the\nsecurity/wpa_supplicant port/pkg. Once installed, update /etc/rc.conf\nto use the new binary:\n\nwpa_supplicant_program=\"/usr/local/sbin/wpa_supplicant\"\n\nand restart networking. \n\nAn updated version of hostapd is available in the FreeBSD Ports\nCollection. Install version 2.6_1 or later of the net/hostapd port/pkg. \nOnce installed, update /etc/rc.conf to use the new binary:\n\nhostapd_program=\"/usr/local/sbin/hostapd\"\n\nand restart hostapd. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\nRestart the Wi-Fi network interfaces/hostapd or reboot the system. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nRestart the Wi-Fi network interfaces/hostapd or reboot the system. \n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 11.0-RELEASE, 11.1-RELEASE, and 11-STABLE]\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch.asc\n# gpg --verify wpa-11.patch.asc\n\n[FreeBSD 10.3-RELEASE, 10.4-RELEASE, and 10-STABLE]\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch\n# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch.asc\n# gpg --verify wpa-10.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in \u003cURL:https://www.FreeBSD.org/handbook/makeworld.html\u003e. \n\nRestart the applicable daemons, or reboot the system. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/11/                                                        r324697\nreleng/11.0/                                                      r324698\nreleng/11.1/                                                      r324699\nstable/10/                                                        r324739\nreleng/10.3/                                                      r324740\nreleng/10.4/                                                      r324741\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n\u003cURL:https://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\u003e\n\nVII. References\n\n\u003cURL:https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\u003e\n\u003cURL:https://www.krackattacks.com/\u003e\n\nThe latest revision of this advisory is available at\n\u003cURL:https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc\u003e\n-----BEGIN PGP SIGNATURE-----\n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\nETx2QOZgKnCs2oDNiw4aQHb7kvi2w94Iw/R1sAPkkxYJWO3reyE=\n=h/5q\n-----END PGP SIGNATURE-----\n. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz:  Upgraded. \n  This update includes patches to mitigate the WPA2 protocol issues known\n  as \"KRACK\" (Key Reinstallation AttaCK), which may be used to decrypt data,\n  hijack TCP connections, and to forge and inject packets. \n  CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT)\n    Reassociation Request and reinstalling the pairwise encryption key (PTK-TK)\n    while processing it. \n  For more information, see:\n    https://www.krackattacks.com/\n    https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088\n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.0 package:\nd8ecfaadb50b3547967ab53733ffc019  wpa_supplicant-2.6-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\nf25216d28800504ce498705da7c9a825  wpa_supplicant-2.6-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n15c61050e4bab2581757befd86be74c0  wpa_supplicant-2.6-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n49fd537a520338744f7757615556d352  wpa_supplicant-2.6-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\nc5539f40c8510af89be92945f0f80185  wpa_supplicant-2.6-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n4c527ff84fcdfd7839f217bbce2e4ae4  wpa_supplicant-2.6-x86_64-1_slack14.2.txz\n\nSlackware -current package:\n28bd88a54e96368f7a7020c1f5fb67fe  n/wpa_supplicant-2.6-i586-2.txz\n\nSlackware x86_64 -current package:\n464fc6b48d1ac077f47e9a3a8534c160  n/wpa_supplicant-2.6-x86_64-2.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-13078"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "IVD",
        "id": "d6bbedba-ffb0-46fc-8b8d-fc2a4fce19b2"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13078"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145395"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144944"
      },
      {
        "db": "PACKETSTORM",
        "id": "144659"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      }
    ],
    "trust": 4.23
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-13078",
        "trust": 4.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519",
        "trust": 4.2
      },
      {
        "db": "BID",
        "id": "101274",
        "trust": 2.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-17420",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1039577",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039576",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039581",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039578",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039585",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039573",
        "trust": 1.7
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2017-003",
        "trust": 1.7
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2017-005",
        "trust": 1.7
      },
      {
        "db": "SIEMENS",
        "id": "SSA-901333",
        "trust": 1.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-18-114-01",
        "trust": 1.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-029-01",
        "trust": 1.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-353-02",
        "trust": 1.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-01",
        "trust": 1.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-325-01",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30405",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-381",
        "trust": 0.8
      },
      {
        "db": "JUNIPER",
        "id": "JSA10827",
        "trust": 0.8
      },
      {
        "db": "DLINK",
        "id": "SAP10075",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-02A",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU94846424",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU90609033",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009171",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4125",
        "trust": 0.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-299-02",
        "trust": 0.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-02",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "D6BBEDBA-FFB0-46FC-8B8D-FC2A4FCE19B2",
        "trust": 0.2
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13078",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144652",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145394",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145395",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144630",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144632",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144944",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144659",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144669",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144663",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d6bbedba-ffb0-46fc-8b8d-fc2a4fce19b2"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13078"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145395"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144944"
      },
      {
        "db": "PACKETSTORM",
        "id": "144659"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13078"
      }
    ]
  },
  "id": "VAR-201710-0211",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "d6bbedba-ffb0-46fc-8b8d-fc2a4fce19b2"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      }
    ],
    "trust": 1.400319345
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d6bbedba-ffb0-46fc-8b8d-fc2a4fce19b2"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      }
    ]
  },
  "last_update_date": "2025-12-22T22:45:58.979000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "ARUBA-PSA-2017-007",
        "trust": 0.8,
        "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt"
      },
      {
        "title": "DSA-3999",
        "trust": 0.8,
        "url": "https://www.debian.org/security/2017/dsa-3999"
      },
      {
        "title": "FreeBSD-SA-17:07.wpa",
        "trust": 0.8,
        "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-17:07.wpa.asc"
      },
      {
        "title": "LEN-17420",
        "trust": 0.8,
        "url": "https://support.lenovo.com/jp/en/product_security/len-17420"
      },
      {
        "title": "NV17-024",
        "trust": 0.8,
        "url": "http://jpn.nec.com/security-info/secinfo/nv17-024.html"
      },
      {
        "title": "openSUSE-SU-2017:2755",
        "trust": 0.8,
        "url": "https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
      },
      {
        "title": "SUSE-SU-2017:2745",
        "trust": 0.8,
        "url": "https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
      },
      {
        "title": "SUSE-SU-2017:2752",
        "trust": 0.8,
        "url": "https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
      },
      {
        "title": "KRACKs - wpa_supplicant Multiple Vulnerabilities",
        "trust": 0.8,
        "url": "https://access.redhat.com/security/vulnerabilities/kracks"
      },
      {
        "title": "RHSA-2017:2907",
        "trust": 0.8,
        "url": "https://access.redhat.com/errata/RHSA-2017:2907"
      },
      {
        "title": "RHSA-2017:2911",
        "trust": 0.8,
        "url": "https://access.redhat.com/errata/RHSA-2017:2911"
      },
      {
        "title": "USN-3455-1",
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/usn/USN-3455-1/"
      },
      {
        "title": "WPA packet number reuse with replayed messages and key reinstallation",
        "trust": 0.8,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt"
      },
      {
        "title": "Wi-Fi\u306e\u8a8d\u8a3c\uff0f\u6697\u53f7\u5316\u6280\u8853WPA2\u304a\u3088\u3073WPA\u306e\u8907\u6570\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066",
        "trust": 0.8,
        "url": "http://www.fujitsu.com/jp/products/network/support/2017/srm-01/index.html"
      },
      {
        "title": "WPA2\u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u5f0a\u793e\u8abf\u67fb\u30fb\u5bfe\u5fdc\u72b6\u6cc1\u306b\u3064\u3044\u3066",
        "trust": 0.8,
        "url": "http://www.iodata.jp/support/information/2017/wpa2/"
      },
      {
        "title": "\u7121\u7ddaLAN \u8a8d\u8a3c\uff0f\u6697\u53f7\u5316\u6280\u8853WPA2\u304a\u3088\u3073WPA\u306b\u95a2\u3059\u308b\u8106\u5f31\u6027\u306e\u304a\u77e5\u3089\u305b",
        "trust": 0.8,
        "url": "http://www.fmworld.net/biz/common/info/20171110/"
      },
      {
        "title": "Patch for WPA2 Wireless Network GTK Group Key Reload Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/103819"
      },
      {
        "title": "Multiple WiFi product WPA2 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75495"
      },
      {
        "title": "Red Hat: Important: wpa_supplicant security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172911 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: wpa_supplicant security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172907 - Security Advisory"
      },
      {
        "title": "Red Hat: CVE-2017-13078",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2017-13078"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-13078"
      },
      {
        "title": "Apple: Wi-Fi Update for Boot Camp 6.4.0",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=4dc3bb86865485e4364fd6b2dc2fc379"
      },
      {
        "title": "Apple: AirPort Base Station Firmware Update 7.7.9",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7ca8130f8030911575aa17c0e84114dd"
      },
      {
        "title": "Apple: watchOS 4.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=345c3fa8a313cd9a1ced5ef372c465c4"
      },
      {
        "title": "Apple: AirPort Base Station Firmware Update 7.6.9",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=43d8dcf7961e20b6ec02761d12969c19"
      },
      {
        "title": "Debian CVElist Bug Report Logs: firmware-brcm80211: BroadPwn vulnerability CVE-2017-9417",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=2e0affd9108e95fa2aa2c706c74cd8a9"
      },
      {
        "title": "Ubuntu Security Notice: wpa vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3455-1"
      },
      {
        "title": "Debian Security Advisories: DSA-3999-1 wpa -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=08990d9925276738bd732fa4d58f9ef0"
      },
      {
        "title": "Apple: tvOS 11.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7a8e908aff7c02a31b2d335766e6d5c2"
      },
      {
        "title": "Apple: iOS 11.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7814c280e80969d4c4d88f74b13290f2"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-23] hostapd: man-in-the-middle",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-23"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-22] wpa_supplicant: man-in-the-middle",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-22"
      },
      {
        "title": "HP: HPSBPI03574 rev. 1 - WPA, WPA2 Key Reinstallation Attacks (KRACK attacks) Potential Remote Disclosure of Information: Certain HP Enterprise Printer and MFP products, Certain HP PageWide Printer and MFP Products, HP Jetdirect Accessory Products",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBPI03574"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=6df91267eee9400a24a98876f50ffe84"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014November 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=8c29eb008bb212762e5cfb25c7c5c0d5"
      },
      {
        "title": "Cisco: Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20171016-wpa"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014July 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25584b3d319ca9e7cb2fae9ec5dbf5e0"
      },
      {
        "title": "HP: HPSBHF03571 rev. 6  -  Intel Management Engine Cumulative Security update and fix for WPA2 vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03571"
      },
      {
        "title": "Oracle: Oracle Critical Patch Update Advisory - April 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=4019ca77f50c7a34e4d97833e6f3321e"
      },
      {
        "title": "Apple: macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=870f3f04ef17f7b183f74ae687a1561d"
      },
      {
        "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=7251d5e5f2b1771951980ad7cfde50ba"
      },
      {
        "title": "Oracle: Oracle Critical Patch Update Advisory - January 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=e2a7f287e9acc8c64ab3df71130bc64d"
      },
      {
        "title": "vanhoefm-krackattacks-scripts",
        "trust": 0.1,
        "url": "https://github.com/84KaliPleXon3/vanhoefm-krackattacks-scripts "
      },
      {
        "title": "krankattack",
        "trust": 0.1,
        "url": "https://github.com/DevKosov/krankattack "
      },
      {
        "title": "krackattacks-scripts",
        "trust": 0.1,
        "url": "https://github.com/vanhoefm/krackattacks-scripts "
      },
      {
        "title": "KRACK",
        "trust": 0.1,
        "url": "https://github.com/chinatso/KRACK "
      },
      {
        "title": "krackinfo",
        "trust": 0.1,
        "url": "https://github.com/kristate/krackinfo "
      },
      {
        "title": "nixos-issue-db-example",
        "trust": 0.1,
        "url": "https://github.com/andir/nixos-issue-db-example "
      },
      {
        "title": "SamsungReleaseNotes",
        "trust": 0.1,
        "url": "https://github.com/samreleasenotes/SamsungReleaseNotes "
      },
      {
        "title": "welivesecurity",
        "trust": 0.1,
        "url": "https://www.welivesecurity.com/2019/10/17/alexa-how-amazon-echo-kindle-got-kracked/"
      },
      {
        "title": "BleepingComputer",
        "trust": 0.1,
        "url": "https://www.bleepingcomputer.com/news/security/millions-of-amazon-echo-and-kindle-devices-affected-by-wifi-bug/"
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2017/11/07/android_november_security_update/"
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2017/10/16/wpa2_inscure_krackattack/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13078"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-323",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-330",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-254",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13078"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.7,
        "url": "https://www.krackattacks.com/"
      },
      {
        "trust": 3.3,
        "url": "https://source.android.com/security/bulletin/2017-11-01"
      },
      {
        "trust": 2.9,
        "url": "http://www.securityfocus.com/bid/101274"
      },
      {
        "trust": 2.8,
        "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-007.txt"
      },
      {
        "trust": 2.8,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171016-wpa"
      },
      {
        "trust": 2.7,
        "url": "https://access.redhat.com/security/vulnerabilities/kracks"
      },
      {
        "trust": 2.5,
        "url": "http://www.debian.org/security/2017/dsa-3999"
      },
      {
        "trust": 2.2,
        "url": "https://access.redhat.com/errata/rhsa-2017:2911"
      },
      {
        "trust": 2.1,
        "url": "http://www.kb.cert.org/vuls/id/228519"
      },
      {
        "trust": 2.1,
        "url": "https://access.redhat.com/errata/rhsa-2017:2907"
      },
      {
        "trust": 2.0,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
      },
      {
        "trust": 1.8,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt"
      },
      {
        "trust": 1.8,
        "url": "http://www.ubuntu.com/usn/usn-3455-1"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039585"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039581"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039578"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039577"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039576"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039573"
      },
      {
        "trust": 1.7,
        "url": "https://support.lenovo.com/us/en/product_security/len-17420"
      },
      {
        "trust": 1.7,
        "url": "https://security.freebsd.org/advisories/freebsd-sa-17:07.wpa.asc"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
      },
      {
        "trust": 1.7,
        "url": "https://security.gentoo.org/glsa/201711-03"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208222"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208221"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208220"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208219"
      },
      {
        "trust": 1.7,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
      },
      {
        "trust": 1.7,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03792en_us"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2017-005"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2017-003"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html"
      },
      {
        "trust": 1.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13078"
      },
      {
        "trust": 1.2,
        "url": "https://ics-cert.us-cert.gov/advisories/icsma-18-114-01"
      },
      {
        "trust": 1.1,
        "url": "https://papers.mathyvanhoef.com/ccs2017.pdf"
      },
      {
        "trust": 1.1,
        "url": "https://w1.fi/security/2017-1/"
      },
      {
        "trust": 1.1,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00101\u0026languageid=en-fr"
      },
      {
        "trust": 1.1,
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-13080"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-353-02"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-01"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-325-01"
      },
      {
        "trust": 1.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsma-19-029-01"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13077"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13078"
      },
      {
        "trust": 0.8,
        "url": "https://cwe.mitre.org/data/definitions/323.html"
      },
      {
        "trust": 0.8,
        "url": "https://actiontecsupport.zendesk.com/hc/en-us/articles/115005205283-krack-vulnerability"
      },
      {
        "trust": 0.8,
        "url": "https://www3.aerohive.com/support/security-bulletins/product-security-announcement-aerohives-response-to-krack-10162017.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.al-enterprise.com/en/support/security-alert-krack"
      },
      {
        "trust": 0.8,
        "url": "https://support.apple.com/en-gb/ht208222"
      },
      {
        "trust": 0.8,
        "url": "https://security.archlinux.org/avg-447"
      },
      {
        "trust": 0.8,
        "url": "https://www.asus.com/static_webpage/asus-product-security-advisory/"
      },
      {
        "trust": 0.8,
        "url": "https://community.barracudanetworks.com/forum/index.php?/topic/23525-security-advisories/page-2"
      },
      {
        "trust": 0.8,
        "url": "https://lists.centos.org/pipermail/centos-announce/2017-october/022569.html"
      },
      {
        "trust": 0.8,
        "url": "https://community.cypress.com/docs/doc-13871"
      },
      {
        "trust": 0.8,
        "url": "http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10075"
      },
      {
        "trust": 0.8,
        "url": "http://www.dell.com/support/article/sln307822"
      },
      {
        "trust": 0.8,
        "url": "https://github.com/espressif/esp8266_nonos_sdk"
      },
      {
        "trust": 0.8,
        "url": "https://extremeportal.force.com/extrarticledetail?n=000018005"
      },
      {
        "trust": 0.8,
        "url": "https://bodhi.fedoraproject.org/updates/fedora-2017-60bfb576b7"
      },
      {
        "trust": 0.8,
        "url": "http://www.fortiguard.com/psirt/fg-ir-17-196"
      },
      {
        "trust": 0.8,
        "url": "https://www.freebsd.org/security/advisories/freebsd-sa-17:07.wpa.asc"
      },
      {
        "trust": 0.8,
        "url": "https://bugs.gentoo.org/634440"
      },
      {
        "trust": 0.8,
        "url": "https://support.hpe.com/hpsc/doc/public/display?sp4ts.oid=null\u0026doclocale=en_us\u0026docid=emr_na-a00029151en_us"
      },
      {
        "trust": 0.8,
        "url": "https://kb.juniper.net/jsa10827"
      },
      {
        "trust": 0.8,
        "url": "https://support.lenovo.com/ca/en/product_security/len-17420"
      },
      {
        "trust": 0.8,
        "url": "http://www.microchip.com/wwwproducts/en/atwinc1500"
      },
      {
        "trust": 0.8,
        "url": "http://mail-index.netbsd.org/source-changes/2017/10/16/msg088877.html"
      },
      {
        "trust": 0.8,
        "url": "https://kb.netgear.com/000049498/security-advisory-for-wpa-2-vulnerabilities-psv-2017-2826-psv-2017-2836-psv-2017-2837"
      },
      {
        "trust": 0.8,
        "url": "https://forum.peplink.com/t/security-advisory-wpa2-vulnerability-vu-228519/12715"
      },
      {
        "trust": 0.8,
        "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-101617-v1.0.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://www.suse.com/de-de/support/kb/doc/?id=7022107"
      },
      {
        "trust": 0.8,
        "url": "https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---wpa-and-wpa2-vulnerabilities/"
      },
      {
        "trust": 0.8,
        "url": "http://www.slackware.com/changelog/stable.php?cpu=x86_64"
      },
      {
        "trust": 0.8,
        "url": "https://community.sophos.com/kb/en-us/127658"
      },
      {
        "trust": 0.8,
        "url": "https://www.toshibacommerce.com/wps/myportal/%21ut/p/a1/rzrnc8igeiz_sw8egqhjcdmmwr8abw2dqcnfoyqotidrrk399uxrrwotuzgws7a87y6z88iuzmcq2u4uwcnlzypjnjj5-exr_wnhya-laxtrid-j3uchdtb8gylmuw6qzgktovtowsrrqlrs6-8dbeqhwc1mykqnlabgdjlf1yjvn7i5af4qtdwsn2tri7j"
      },
      {
        "trust": 0.8,
        "url": "http://www.toshiba-personalstorage.net/en/news/hdd/ot_notice/20171017.htm"
      },
      {
        "trust": 0.8,
        "url": "http://support.toshiba.com/support/staticcontentdetail?contentid=4015875\u0026isfromtoclink=false"
      },
      {
        "trust": 0.8,
        "url": "https://community.ubnt.com/t5/unifi-updates-blog/firmware-3-9-3-7537-for-uap-usw-has-been-released/ba-p/2099365"
      },
      {
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/usn/usn-3455-1/"
      },
      {
        "trust": 0.8,
        "url": "http://en.miui.com/thread-954223-1-1.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.zebra.com/content/dam/zebra_new_ia/en-us/support-and-downloads/lifeguard-security/krack-security-bulletin.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://www.zyxel.com/support/announcement_wpa2_key_management.shtml"
      },
      {
        "trust": 0.8,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk120938"
      },
      {
        "trust": 0.8,
        "url": "https://community.rsa.com/docs/doc-84103"
      },
      {
        "trust": 0.8,
        "url": "https://support.f5.com/csp/article/k23642330"
      },
      {
        "trust": 0.8,
        "url": "https://forum.mikrotik.com/viewtopic.php?f=21\u0026t=126695"
      },
      {
        "trust": 0.8,
        "url": "https://community.linksys.com/t5/wireless-routers/krack-vulnerability/td-p/1218573"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13080"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-02a"
      },
      {
        "trust": 0.8,
        "url": "https://www.ipa.go.jp/security/ciadr/vul/20171017_wpa2.html"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu94846424/"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu90609033/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.kb.cert.org/vuls/id/cheu-aqnmyp"
      },
      {
        "trust": 0.6,
        "url": "https://www.kb.cert.org/vuls/id/228519/"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13087"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4125/"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2017-13077"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2017-13078"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2017-13080"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2017-13087"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13082"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13086"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13088"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13079"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13082"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13086"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13088"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13081"
      },
      {
        "trust": 0.3,
        "url": "https://github.com/stevenhoneyman/wpa_gui/tree/master/wpa_supplicant-2.4"
      },
      {
        "trust": 0.3,
        "url": "http://www.wi-fi.org/index.php"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-ie/ht208847"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208334"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208327"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208325"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2017/dec/msg00009.html"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2017/dec/msg00008.html"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2018/jul/msg00000.html"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13079"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13081"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13084"
      },
      {
        "trust": 0.3,
        "url": "http://docs.fortinet.com/uploaded/files/3961/fortiap-v5.6.1-release-notes.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-299-02"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-02"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.2,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.2,
        "url": "https://support.apple.com/downloads/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/330.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/kristate/krackinfo"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9417"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4476"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4477"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2.1-0ubuntu1.5"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu9.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu6.2"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-13078"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-13079"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-13077"
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-10.patch.asc"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/advisories/freebsd-sa-17:07.wpa.asc\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://www.krackattacks.com/\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-11.patch.asc"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/\u003e."
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-11.patch"
      },
      {
        "trust": 0.1,
        "url": "https://security.freebsd.org/patches/sa-17:07/wpa-10.patch"
      },
      {
        "trust": 0.1,
        "url": "https://www.freebsd.org/handbook/makeworld.html\u003e."
      },
      {
        "trust": 0.1,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13080"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13082"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13077"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13087"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13081"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13084"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com/gpg-key"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13086"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13088"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13079"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13084"
      },
      {
        "trust": 0.1,
        "url": "http://osuosl.org)"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13078"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145395"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144944"
      },
      {
        "db": "PACKETSTORM",
        "id": "144659"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13078"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "d6bbedba-ffb0-46fc-8b8d-fc2a4fce19b2"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13078"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145395"
      },
      {
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "db": "PACKETSTORM",
        "id": "144944"
      },
      {
        "db": "PACKETSTORM",
        "id": "144659"
      },
      {
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13078"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-10-17T00:00:00",
        "db": "IVD",
        "id": "d6bbedba-ffb0-46fc-8b8d-fc2a4fce19b2"
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "date": "2017-10-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-13078"
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "BID",
        "id": "101274"
      },
      {
        "date": "2017-10-17T16:52:00",
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "date": "2017-12-13T03:33:33",
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "date": "2017-12-13T04:44:44",
        "db": "PACKETSTORM",
        "id": "145395"
      },
      {
        "date": "2017-10-16T13:49:34",
        "db": "PACKETSTORM",
        "id": "144630"
      },
      {
        "date": "2017-10-16T23:23:00",
        "db": "PACKETSTORM",
        "id": "144632"
      },
      {
        "date": "2017-11-10T19:19:00",
        "db": "PACKETSTORM",
        "id": "144944"
      },
      {
        "date": "2017-10-18T20:20:00",
        "db": "PACKETSTORM",
        "id": "144659"
      },
      {
        "date": "2017-10-19T14:28:55",
        "db": "PACKETSTORM",
        "id": "144669"
      },
      {
        "date": "2017-10-18T20:44:00",
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      },
      {
        "date": "2017-11-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      },
      {
        "date": "2017-10-17T13:29:00.193000",
        "db": "NVD",
        "id": "CVE-2017-13078"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-30405"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-13078"
      },
      {
        "date": "2019-02-21T09:00:00",
        "db": "BID",
        "id": "101274"
      },
      {
        "date": "2020-11-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      },
      {
        "date": "2019-02-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-009171"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2017-13078"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "security feature problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-381"
      }
    ],
    "trust": 0.6
  }
}

VAR-201710-0207

Vulnerability from variot - Updated: 2025-12-22 21:51

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or "KRACK" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). The GTK group key reloading vulnerability exists in the WPA2 wireless network. WPA2 is prone to multiple security weaknesses. Exploiting these issues may allow an unauthorized user to intercept and manipulate data or disclose sensitive information. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: wpa_supplicant security update Advisory ID: RHSA-2017:2907-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2907 Issue date: 2017-10-17 CVE Names: CVE-2017-13077 CVE-2017-13078 CVE-2017-13080 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 =====================================================================

  1. Summary:

An update for wpa_supplicant is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64

  1. Description:

The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)

Red Hat would like to thank CERT for reporting these issues. Upstream acknowledges Mathy Vanhoef (University of Leuven) as the original reporter of these issues.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

aarch64: wpa_supplicant-2.6-5.el7_4.1.aarch64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.aarch64.rpm

ppc64: wpa_supplicant-2.6-5.el7_4.1.ppc64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64.rpm

ppc64le: wpa_supplicant-2.6-5.el7_4.1.ppc64le.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64le.rpm

s390x: wpa_supplicant-2.6-5.el7_4.1.s390x.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.s390x.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: wpa_supplicant-2.6-5.el7_4.1.src.rpm

x86_64: wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm wpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2017-13077 https://access.redhat.com/security/cve/CVE-2017-13078 https://access.redhat.com/security/cve/CVE-2017-13080 https://access.redhat.com/security/cve/CVE-2017-13082 https://access.redhat.com/security/cve/CVE-2017-13086 https://access.redhat.com/security/cve/CVE-2017-13087 https://access.redhat.com/security/cve/CVE-2017-13088 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/kracks

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFZ5nilXlSAg2UNWIIRAu7RAJwO3CwWfh61xybvjdxlG0Iqd17JpwCcD5FK 5vz/c6aXRYIJEjVFKVqkVU0= =rSjV -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven

Installation note:

Firmware version 7.6.9 is installed on AirPort Express, AirPort Extreme, or AirPort Time Capsule base stations with 802.11n using AirPort Utility for Mac or iOS.

AirPort Utility for Mac is a free download from https://support.apple.com/downloads/ and AirPort Utility for iOS is a free download from the App Store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

APPLE-SA-2017-12-13-6 Additional information for APPLE-SA-2017-12-6-2 iOS 11.2

iOS 11.2 addresses the following:

IOKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues were addressed through improved state management. CVE-2017-13847: Ian Beer of Google Project Zero

IOMobileFrameBuffer Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privilege Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13879: Apple

IOSurface Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13861: Ian Beer of Google Project Zero

Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13862: Apple CVE-2017-13876: Ian Beer of Google Project Zero CVE-2017-13867: Ian Beer of Google Project Zero

Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2017-13833: Brandon Azad

Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A type confusion issue was addressed with improved memory handling. CVE-2017-13855: Jann Horn of Google Project Zero

Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13865: Ian Beer of Google Project Zero CVE-2017-13868: Brandon Azad CVE-2017-13869: Jann Horn of Google Project Zero

Mail Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Incorrect certificate is used for encryption Description: A S/MIME issue existed in the handling of encrypted email. This issue was addressed through improved selection of the encryption certificate. CVE-2017-13874: an anonymous researcher

Mail Drafts Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker with a privileged network position may be able to intercept mail Description: An encryption issue existed with S/MIME credetials. The issue was addressed with additional checks and user control. CVE-2017-13860: Michael Weishaar of INNEO Solutions GmbH

Mail Message Framework Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Visiting a malicious website may lead to address bar spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2017-2433: an anonymous researcher, an anonymous researcher, an anonymous researcher

WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2017-7156: an anonymous researcher CVE-2017-7157: an anonymous researcher CVE-2017-13856: Jeonghoon Shin CVE-2017-13870: an anonymous researcher CVE-2017-13866: an anonymous researcher Entry added December 13, 2017

Wi-Fi Available for: iPhone 6s, iPhone 6s Plus, iPhone 6, iPhone 6 Plus, iPhone SE, iPhone 5s, 12.9-inch iPad Pro 1st generation, iPad Air 2, iPad Air, iPad 5th generation, iPad mini 4, iPad mini 3, iPad mini 2, and iPod touch 6th generation Released for iPhone 7 and later and iPad Pro 9.7-inch (early 2016) and later in iOS 11.1. This was addressed with improved state management. CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven

Installation note:

This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/

iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.

The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.

To check that the iPhone, iPod touch, or iPad has been updated:

  • Navigate to Settings
  • Select General
  • Select About. The version after applying this update will be "11.2".

Software Description: - linux-firmware: Firmware for Linux kernel drivers

Details:

Mathy Vanhoef discovered that the firmware for several Intel WLAN devices incorrectly handled WPA2 in relation to Wake on WLAN.

  • CVE-2017-13080

CVE Revision Information:

CVE-2017-13080

  • Title: CVE-2017-13080 | Windows Wireless WPA Group Key Reinstallation Vulnerability
  • https://portal.msrc.microsoft.com/en-us/security-guidance
  • Reason for Revision: CVE-2017-13080 has been added to the October 2017 security release in lieu of ADV170016, which has been deprecated. CVE-2017-13080 was released as part of a multi-vendor coordinated disclosure. Please see the FAQ for more information.
  • Originally posted: October 16, 2017
  • Updated: N/A
  • CVE Severity Rating: Important
  • Version: 1.0

Other Information

Recognize and avoid fraudulent email to Microsoft customers:

If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at .


THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.


Microsoft respects your privacy. Please read our online Privacy Statement at .

If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: .

These settings will not affect any newsletters youave requested or any mandatory service communications that are considered part of certain Microsoft services.

For legal Information, see: .

This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052

-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) - not licensed for commercial use: www.pgp.com Charset: utf-8

wsFVAwUBWeTb2vsCXwi14Wq8AQimsw//UE92KMajVPARF4zMmfyQnbypCJhwOhsG n7uhJwIF8STYnUDQPfjDPGzmJSDIiQTg3PeewAzg+Ib3GZCsPdUQHMEl/DfGLFWy k814Bh158GDGvWIwDYkIgn1cRrdFP63gVg13ImvgCA2i8KOg9gy1LcnJ1tkIuHAJ bv22fe3zT9PgfLArRpm/nb3qMRnx/VRkTeS80y/RW2a2tkPSzyqLBRgZEP7t+RxJ M4G7cFRS0xpLrPE7PYn8f+tdjA04dWPO77eLOG+gDSpK5mFc8ccdjW2VoKJlRT0I i2HESEZipsuVDd4X3lkl5BigtxdKFTNDIFhE/m3pybDTbjClhjSHF+SR7T8yCOO8 fiXm1Nt0201321dhlNrtxGFV5+Q1lixO0+X7XDGCiZFTECs18vpGrDNZGQGqJ7Hj gmdSCNnfW7tashCXAIUtvoHTzK6v0hLh4ufelvdNgw8+qLUB6Z9RmrHzCHRm/i2p IuCtzp4GlPE0cBz3kUPmS0VYrYddEPS/n/vffeQpfAbbFENclTrEwTTxEYkP/vC0 qh2DNFCKnpvs8EUz/dtAdBuDaF3zuENMf/LJJf1EKOnp06b0JsRYDplKKgICgxrF kpFoAwAE14+KYcEUQhP6/jvDJXmWfMRk60Bsbs0qsfTAsFL7O9z0NrjI5xZEjF3j OYE0vOnWj3g= =2086 -----END PGP SIGNATURE----- . ========================================================================== Kernel Live Patch Security Notice LSN-0036-1 April 2, 2018

linux vulnerability

A security issue affects these releases of Ubuntu:

| Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency |

Summary:

Several security issues were fixed in the kernel. (CVE-2017-13080)

Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel improperly performed sign extension in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16995)

Update instructions:

The problem can be corrected by updating your livepatches to the following versions:

| Kernel | Version | flavors | |-----------------+----------+--------------------------| | 4.4.0-116.140 | 33.2 | generic, lowlatency | | lts-4.4.0-116.140_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |

Additionally, you should install an updated kernel with these fixes and reboot at your convienience.

References: CVE-2017-13080, CVE-2017-16995

-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce .

Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz: Upgraded. This update includes patches to mitigate the WPA2 protocol issues known as "KRACK" (Key Reinstallation AttaCK), which may be used to decrypt data, hijack TCP connections, and to forge and inject packets. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. For more information, see: https://www.krackattacks.com/ https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088 ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz

Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz

Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz

MD5 signatures: +-------------+

Slackware 14.0 package: d8ecfaadb50b3547967ab53733ffc019 wpa_supplicant-2.6-i486-1_slack14.0.txz

Slackware x86_64 14.0 package: f25216d28800504ce498705da7c9a825 wpa_supplicant-2.6-x86_64-1_slack14.0.txz

Slackware 14.1 package: 15c61050e4bab2581757befd86be74c0 wpa_supplicant-2.6-i486-1_slack14.1.txz

Slackware x86_64 14.1 package: 49fd537a520338744f7757615556d352 wpa_supplicant-2.6-x86_64-1_slack14.1.txz

Slackware 14.2 package: c5539f40c8510af89be92945f0f80185 wpa_supplicant-2.6-i586-1_slack14.2.txz

Slackware x86_64 14.2 package: 4c527ff84fcdfd7839f217bbce2e4ae4 wpa_supplicant-2.6-x86_64-1_slack14.2.txz

Slackware -current package: 28bd88a54e96368f7a7020c1f5fb67fe n/wpa_supplicant-2.6-i586-2.txz

Slackware x86_64 -current package: 464fc6b48d1ac077f47e9a3a8534c160 n/wpa_supplicant-2.6-x86_64-2.txz

Installation instructions: +------------------------+

Upgrade the package as root:

upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. CVE-2017-13804: @qwertyoruiopz at KJC Research Intl. S.R.L. CVE-2017-13785: Ivan Fratric of Google Project Zero CVE-2017-13784: Ivan Fratric of Google Project Zero CVE-2017-13783: Ivan Fratric of Google Project Zero CVE-2017-13788: xisigr of Tencent's Xuanwu Lab (tencent.com) CVE-2017-13798: Ivan Fratric of Google Project Zero CVE-2017-13795: Ivan Fratric of Google Project Zero CVE-2017-13802: Ivan Fratric of Google Project Zero CVE-2017-13792: Ivan Fratric of Google Project Zero CVE-2017-13794: Ivan Fratric of Google Project Zero CVE-2017-13791: Ivan Fratric of Google Project Zero CVE-2017-13796: Ivan Fratric of Google Project Zero CVE-2017-13793: Hanul Choi working with Trend Micro's Zero Day Initiative CVE-2017-13803: chenqin (ee|) of Ant-financial Light-Year Security

Wi-Fi Available for: Apple TV 4K Impact: An attacker in Wi-Fi range may force nonce reuse in WPA clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0207",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.10"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.3.11"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.10"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.11"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.9"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.5"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.8"
      },
      {
        "model": "openstack cloud",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "6"
      },
      {
        "model": "linux enterprise desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.9"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "14.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.5"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "*"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.8"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.6"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "10"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.2"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.6"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.5"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.4"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.8"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.1"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.7.3"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.0"
      },
      {
        "model": "linux enterprise point of sale",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.4"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.6"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.7"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.7.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "11.1"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.0"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.9"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.6"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.4"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.9"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.1"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.8"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "42.2"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.7"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "17.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.4"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.10"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "10.4"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.1"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.5"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.3"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.8"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.11"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.2"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.8"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "11"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "42.3"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "9front",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "adtran",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "avm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "actiontec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "aerohive",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "android open source",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "arch linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "aruba",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "asustek computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "barracuda",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cambium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "centos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cradlepoint",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cypress semiconductor",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian gnu linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "digi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "edimax computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "engenius",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "endian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "espressif",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "extreme",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "f secure",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fortinet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "google",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hostap",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ipfire",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "juniper",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lancom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lede",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lifx",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microchip",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mojo",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nest",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netgear",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "opnsense",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "omnirom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "open mesh",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "peplink",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "riverbed",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung mobile",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sonos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sony",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sophos",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "synology",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "tp link",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "technicolor",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "texas instruments",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba commerce",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba electronic devices storage",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba memory",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "turris omnia",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubiquiti",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubuntu",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "volumio",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "watchguard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xiaomi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xirrus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zebra",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zyxel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dd wrt",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "eero",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "pfsense",
        "version": null
      },
      {
        "model": "alliance wi-fi protected access 2",
        "scope": null,
        "trust": 0.6,
        "vendor": "wi fi",
        "version": null
      },
      {
        "model": "scalance w-700",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "linux desktop",
        "version": "12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "linux server",
        "version": "11"
      },
      {
        "model": "atom processor c3200 series for yocto project bsp mr4",
        "scope": null,
        "trust": 0.3,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.1"
      },
      {
        "model": "pyxis supplystation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "sinamics smart access module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "v200"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6.27.3264"
      },
      {
        "model": "meraki mr34",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ck71a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.2.0"
      },
      {
        "model": "macbook air",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18500"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.0"
      },
      {
        "model": "meraki mr26",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "28000"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "meraki mr84",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "510x0"
      },
      {
        "model": "windows server r2 for itanium-based systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "contact itc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "81130"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.0.0"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "meraki mr18",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "8.1.0.3"
      },
      {
        "model": "scalance w1750d",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "secure ii med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3002"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "210x0"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1015110"
      },
      {
        "model": "aironet access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "contact fl wlan ap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.1"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "wap371 wireless-ac n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ex-handy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "2090"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.2"
      },
      {
        "model": "contact rad-80211-xd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.2"
      },
      {
        "model": "contact fl wlan dap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10.9.1"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.25"
      },
      {
        "model": "pyxis medstation es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "wireless ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88210"
      },
      {
        "model": "pyxis stockstation system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "macbook",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.7.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10.9.2"
      },
      {
        "model": "scalance wlc712",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "contact fl wlan spa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "meraki mr62",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "simatic et200 pro im154-6 pn iwlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "tropos broadband mesh routers and bridges",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "abb",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10.9.2"
      },
      {
        "model": "meraki mr33",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.3"
      },
      {
        "model": "micros handheld terminal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "0"
      },
      {
        "model": "windows server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "20120"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.33.9.2"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1017030"
      },
      {
        "model": "atom processor c3200 series for yocto project bsp mr4.1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "2.6"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.0"
      },
      {
        "model": "contact fl wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "110x0"
      },
      {
        "model": "windows for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "100"
      },
      {
        "model": "s3 med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3002"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.2.4"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.1"
      },
      {
        "model": "contact fl comserver wlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "232/422/4850"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.8"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7."
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.1.91.3272"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2.4.9"
      },
      {
        "model": "contact fl wlan ap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "230802-110"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.1"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "meraki mr14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.5"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18150"
      },
      {
        "model": "wireless client bridge 2.0.0.1-aruba501-b00",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "501"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.33.9.2"
      },
      {
        "model": "airport express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "clarity engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "1.0"
      },
      {
        "model": "meraki mr30h",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "airport extreme",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "windows server r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "20120"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.2.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "8.0"
      },
      {
        "model": "contact bl2 bpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.0.1"
      },
      {
        "model": "enterprise linux for ibm z systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "watch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "w1 f1",
        "version": "2.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "4.0"
      },
      {
        "model": "ruggedcom rx1400",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "cn70a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1015110"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3"
      },
      {
        "model": "pyxis parx handheld",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.10"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1.40.100"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1.1"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3"
      },
      {
        "model": "windows rt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.1"
      },
      {
        "model": "meraki mr42",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3.1.6"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.3"
      },
      {
        "model": "wap561 wireless-n dual radio selectable band access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.26.3000"
      },
      {
        "model": "instantos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6"
      },
      {
        "model": "tvos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.0"
      },
      {
        "model": "windows server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2016"
      },
      {
        "model": "contact rad-whg/wlan-xd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.33.9.3"
      },
      {
        "model": "wi-fi update for boot camp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "6.4.0"
      },
      {
        "model": "suremark printer 2nr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.1"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.2"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "enterprise linux for power little endian",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.0.0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.8"
      },
      {
        "model": "windows server for x64-based systems sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "pyxis supply roller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.3"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3"
      },
      {
        "model": "telepresence collaboration endpoint",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.2.61.3535"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "70xx0"
      },
      {
        "model": "imac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "meraki mr72",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "watchos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.25.3001"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "8.1.0.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "6.2"
      },
      {
        "model": "meraki mr53",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1"
      },
      {
        "model": "wap551 wireless-n single radio selectable band access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.0.0"
      },
      {
        "model": "wap121 wireless-n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "2.5"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.6.0.1000"
      },
      {
        "model": "wireless client bridge 1.0.1.3-hp501-b0012",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "501"
      },
      {
        "model": "i.roc ci70-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.0.0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.2.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.1"
      },
      {
        "model": "cn70e-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726018.0.0.0"
      },
      {
        "model": "meraki mr24",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "suremark printer 1nr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "50xx0"
      },
      {
        "model": "meraki mr74",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ex-handy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "090"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.4.15"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.7.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.7.20"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "726519.51.7.1"
      },
      {
        "model": "systems esp32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "espressif",
        "version": "0"
      },
      {
        "model": "watchos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.1"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "micros handheld terminal 2.03.0.0.021r",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "38000"
      },
      {
        "model": "pyxis parx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "dx70",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.1.9"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "intouch critical care bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "2141"
      },
      {
        "model": "pyxis anesthesia es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "aironet series officeextend access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18100"
      },
      {
        "model": "windows for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.10"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10.9.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0.55.3000"
      },
      {
        "model": "windows for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "8.10"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.0"
      },
      {
        "model": "meraki mr66",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10.9.1"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6"
      },
      {
        "model": "intouch critical care bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "2131"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.2"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "18300"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.6"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "10.0.0.50.1004"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.1.0"
      },
      {
        "model": "wap321 wireless-n access point with single point setup",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "simatic iwlan-pb/link",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "aironet 1810w series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "meraki mr52",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.5"
      },
      {
        "model": "meraki mr12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "airmesh msr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.7.20"
      },
      {
        "model": "watchos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "4.2"
      },
      {
        "model": "contact fl wlan ec",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "24802-110"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.2.4.8"
      },
      {
        "model": "systems esp8266",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "espressif",
        "version": "0"
      },
      {
        "model": "tv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "pad-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.0.0.1205"
      },
      {
        "model": "ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88610"
      },
      {
        "model": "clarity engine",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "1.0.0.1"
      },
      {
        "model": "aironet series access points",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "15600"
      },
      {
        "model": "windows for 32-bit systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "7"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3.1.5"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.2"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.8"
      },
      {
        "model": "windows for x64-based systems sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "7"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "meraki mr58",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "windows version for 32-bit systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1016070"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.10.9.2"
      },
      {
        "model": "pyxis parassist system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "0"
      },
      {
        "model": "windows server for 32-bit systems sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2008"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "4.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.0"
      },
      {
        "model": "simatic mobile panel 277 iwlan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "pyxis medstation t2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "40000"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826020.0.2.3"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.0.1"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316519.51.0.0"
      },
      {
        "model": "wi-fi update for boot camp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "ipad",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "contact vmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "30xx0"
      },
      {
        "model": "enterprise linux for power big endian",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "w1 f1",
        "version": "2.6"
      },
      {
        "model": "wireless client bridge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "5010"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.0.1"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "11.5"
      },
      {
        "model": "meraki mr11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.3"
      },
      {
        "model": "pyxis anesthesia system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "40000"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "pyxis anesthesia system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "35000"
      },
      {
        "model": "automation stratix 15.3 jc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5100"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "pyxis ciisafe workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bd",
        "version": "??0"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.7"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.0.0"
      },
      {
        "model": "ipad air",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "7.0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4.1"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "enterprise linux for scientific computing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "8.1.71.3608"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.1.41.3024"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.2.1"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "dx80",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.0"
      },
      {
        "model": "contact bl2 ppc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "contact tpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "60130"
      },
      {
        "model": "ipod touch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.1"
      },
      {
        "model": "ck70a-atex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "0"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.3.1"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.51.7.20"
      },
      {
        "model": "macbook pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316819.10"
      },
      {
        "model": "windows for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "100"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.8"
      },
      {
        "model": "active management technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "9.5"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.1"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.4"
      },
      {
        "model": "smart-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "826520.0.2.2"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.33.9.3"
      },
      {
        "model": "tab-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "010"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.3.3"
      },
      {
        "model": "iphone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "macmini",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.4.4.16"
      },
      {
        "model": "contact fl wlan epa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "0"
      },
      {
        "model": "airport time capsule",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "alliance wpa2 (wi-fi protected access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wi fi",
        "version": "2)0"
      },
      {
        "model": "airport base station",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.9"
      },
      {
        "model": "scalance wlc711",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "ruggedcom rs9xxw",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.3.1.15"
      },
      {
        "model": "networks unifi access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubiquiti",
        "version": "0"
      },
      {
        "model": "suremark printer 2cr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "4610"
      },
      {
        "model": "ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "88650"
      },
      {
        "model": "arubaos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4"
      },
      {
        "model": "airport base station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.7"
      },
      {
        "model": "instantos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "arubanetworks",
        "version": "6.5.4"
      },
      {
        "model": "asa 5506w-x w/ firepower services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1016070"
      },
      {
        "model": "airport base station",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6.9"
      },
      {
        "model": "s3 med-surg bed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "stryker",
        "version": "3005"
      },
      {
        "model": "dual band wireless-ac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "316018.0.0.0"
      },
      {
        "model": "smart-ex",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "pepperl fuchs",
        "version": "2010"
      },
      {
        "model": "windows version for x64-based systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1017030"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "11.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "14.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "16.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "17.04"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "debian linux",
        "version": "8.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "debian linux",
        "version": "9.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "10.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "11.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "leap",
        "version": "42.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "leap",
        "version": "42.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux desktop",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux server",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.7.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.7.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux point of sale",
        "version": "11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux server",
        "version": "12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "openstack cloud",
        "version": "6"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mathy Vanhoef from imec-DistriNet and KU Leuven.",
    "sources": [
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2017-13080",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 5.5,
            "id": "CVE-2017-13080",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.1,
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "CNVD-2017-30403",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.6,
            "id": "CVE-2017-13080",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-13080",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-30403",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201710-383",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-13080",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or \"KRACK\" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). The GTK group key reloading vulnerability exists in the WPA2 wireless network. WPA2  is prone to multiple security weaknesses. \nExploiting these issues may allow an unauthorized user to intercept and manipulate data or disclose sensitive information. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: wpa_supplicant security update\nAdvisory ID:       RHSA-2017:2907-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2017:2907\nIssue date:        2017-10-17\nCVE Names:         CVE-2017-13077 CVE-2017-13078 CVE-2017-13080 \n                   CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 \n                   CVE-2017-13088 \n=====================================================================\n\n1. Summary:\n\nAn update for wpa_supplicant is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe wpa_supplicant packages contain an 802.1X Supplicant with support for\nWEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication\nmethods. They implement key negotiation with a WPA Authenticator for client\nstations and controls the roaming and IEEE 802.11 authentication and\nassociation of the WLAN driver. A remote attacker within Wi-Fi range\ncould exploit these attacks to decrypt Wi-Fi traffic or possibly inject\nforged Wi-Fi packets by manipulating cryptographic handshakes used by the\nWPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080,\nCVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)\n\nRed Hat would like to thank CERT for reporting these issues. Upstream\nacknowledges Mathy Vanhoef (University of Leuven) as the original reporter\nof these issues. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\naarch64:\nwpa_supplicant-2.6-5.el7_4.1.aarch64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.aarch64.rpm\n\nppc64:\nwpa_supplicant-2.6-5.el7_4.1.ppc64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64.rpm\n\nppc64le:\nwpa_supplicant-2.6-5.el7_4.1.ppc64le.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.ppc64le.rpm\n\ns390x:\nwpa_supplicant-2.6-5.el7_4.1.s390x.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.s390x.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nwpa_supplicant-2.6-5.el7_4.1.src.rpm\n\nx86_64:\nwpa_supplicant-2.6-5.el7_4.1.x86_64.rpm\nwpa_supplicant-debuginfo-2.6-5.el7_4.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-13077\nhttps://access.redhat.com/security/cve/CVE-2017-13078\nhttps://access.redhat.com/security/cve/CVE-2017-13080\nhttps://access.redhat.com/security/cve/CVE-2017-13082\nhttps://access.redhat.com/security/cve/CVE-2017-13086\nhttps://access.redhat.com/security/cve/CVE-2017-13087\nhttps://access.redhat.com/security/cve/CVE-2017-13088\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/kracks\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFZ5nilXlSAg2UNWIIRAu7RAJwO3CwWfh61xybvjdxlG0Iqd17JpwCcD5FK\n5vz/c6aXRYIJEjVFKVqkVU0=\n=rSjV\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \nCVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\n\nInstallation note:\n\nFirmware version 7.6.9 is installed on AirPort Express, AirPort\nExtreme, or AirPort Time Capsule base stations with 802.11n using\nAirPort Utility for Mac or iOS. \n\nAirPort Utility for Mac is a free download from\nhttps://support.apple.com/downloads/ and AirPort Utility for iOS\nis a free download from the App Store. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-12-13-6 Additional information for\nAPPLE-SA-2017-12-6-2 iOS 11.2\n\niOS 11.2 addresses the following:\n\nIOKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: Multiple memory corruption issues were addressed through\nimproved state management. \nCVE-2017-13847: Ian Beer of Google Project Zero\n\nIOMobileFrameBuffer\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privilege\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13879: Apple\n\nIOSurface\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13861: Ian Beer of Google Project Zero\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13862: Apple\nCVE-2017-13876: Ian Beer of Google Project Zero\nCVE-2017-13867: Ian Beer of Google Project Zero\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2017-13833: Brandon Azad\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: A type confusion issue was addressed with improved\nmemory handling. \nCVE-2017-13855: Jann Horn of Google Project Zero\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13865: Ian Beer of Google Project Zero\nCVE-2017-13868: Brandon Azad\nCVE-2017-13869: Jann Horn of Google Project Zero\n\nMail\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Incorrect certificate is used for encryption\nDescription: A S/MIME issue existed in the handling of encrypted\nemail. This issue was addressed through improved selection of the\nencryption certificate. \nCVE-2017-13874: an anonymous researcher\n\nMail Drafts\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An attacker with a privileged network position may be able to\nintercept mail\nDescription: An encryption issue existed with S/MIME credetials. The\nissue was addressed with additional checks and user control. \nCVE-2017-13860: Michael Weishaar of INNEO Solutions GmbH\n\nMail Message Framework\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Visiting a malicious website may lead to address bar spoofing\nDescription: An inconsistent user interface issue was addressed with\nimproved state management. \nCVE-2017-2433: an anonymous researcher, an anonymous researcher, an\nanonymous researcher\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved memory handling. \nCVE-2017-7156: an anonymous researcher\nCVE-2017-7157: an anonymous researcher\nCVE-2017-13856: Jeonghoon Shin\nCVE-2017-13870: an anonymous researcher\nCVE-2017-13866: an anonymous researcher\nEntry added December 13, 2017\n\nWi-Fi\nAvailable for: iPhone 6s, iPhone 6s Plus, iPhone 6, iPhone 6 Plus,\niPhone SE, iPhone 5s, 12.9-inch iPad Pro 1st generation, iPad Air 2,\niPad Air, iPad 5th generation, iPad mini 4, iPad mini 3, iPad mini 2,\nand iPod touch 6th generation\nReleased for iPhone 7 and later and iPad Pro 9.7-inch (early 2016)\nand later in iOS 11.1. This was addressed with improved state management. \nCVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom https://www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update\nwill be \"11.2\". \n\nSoftware Description:\n- linux-firmware: Firmware for Linux kernel drivers\n\nDetails:\n\nMathy Vanhoef discovered that the firmware for several Intel WLAN\ndevices incorrectly handled WPA2 in relation to Wake on WLAN. \n\n* CVE-2017-13080\n\n\nCVE Revision Information:\n=====================\n\nCVE-2017-13080\n\n - Title: CVE-2017-13080 | Windows Wireless WPA Group Key \n Reinstallation Vulnerability\n - https://portal.msrc.microsoft.com/en-us/security-guidance\n - Reason for Revision: CVE-2017-13080 has been added to the October \n 2017 security release in lieu of ADV170016, which has been \n deprecated. CVE-2017-13080 was released as part of a multi-vendor \n coordinated disclosure. Please see the FAQ for more information. \n - Originally posted: October 16, 2017\n - Updated: N/A \n - CVE Severity Rating: Important\n - Version: 1.0\n\n\nOther Information\n=================\n\nRecognize and avoid fraudulent email to Microsoft customers:\n=============================================================\nIf you receive an email message that claims to be distributing \na Microsoft security update, it is a hoax that may contain \nmalware or pointers to malicious websites. Microsoft does \nnot distribute security updates via email. \n\nThe Microsoft Security Response Center (MSRC) uses PGP to digitally \nsign all security notifications. However, PGP is not required for \nreading security notifications, reading security bulletins, or \ninstalling security updates. You can obtain the MSRC public PGP key\nat . \n\n********************************************************************\nTHE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS\nPROVIDED \"AS IS\" WITHOUT WARRANTY OF ANY KIND. MICROSOFT\nDISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING\nTHE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\nPURPOSE. \nIN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE\nLIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,\nINCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL\nDAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN\nADVISED OF THE POSSIBILITY OF SUCH DAMAGES. \nSOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY\nFOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING\nLIMITATION MAY NOT APPLY. \n********************************************************************\n\nMicrosoft respects your privacy. Please read our online Privacy\nStatement at . \n\nIf you would prefer not to receive future technical security\nnotification alerts by email from Microsoft and its family of\ncompanies please visit the following website to unsubscribe:\n. \n\nThese settings will not affect any newsletters youave requested or\nany mandatory service communications that are considered part of\ncertain Microsoft services. \n\nFor legal Information, see:\n. \n\nThis newsletter was sent by:\nMicrosoft Corporation\n1 Microsoft Way\nRedmond, Washington, USA\n98052\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP Desktop 10.2.0 (Build 1950) - not licensed for commercial use: www.pgp.com\nCharset: utf-8\n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\nOYE0vOnWj3g=\n=2086\n-----END PGP SIGNATURE-----\n. ==========================================================================\nKernel Live Patch Security Notice LSN-0036-1\nApril 2, 2018\n\nlinux vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu:\n\n| Series           | Base kernel  | Arch     | flavors          |\n|------------------+--------------+----------+------------------|\n| Ubuntu 16.04 LTS | 4.4.0        | amd64    | generic          |\n| Ubuntu 16.04 LTS | 4.4.0        | amd64    | lowlatency       |\n| Ubuntu 14.04 LTS | 4.4.0        | amd64    | generic          |\n| Ubuntu 14.04 LTS | 4.4.0        | amd64    | lowlatency       |\n\nSummary:\n\nSeveral security issues were fixed in the kernel. (CVE-2017-13080)\n\nJann Horn discovered that the Berkeley Packet Filter (BPF) implementation\nin the Linux kernel improperly performed sign extension in some situations. \nA local attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2017-16995)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your livepatches to the following\nversions:\n\n| Kernel          | Version  | flavors                  |\n|-----------------+----------+--------------------------|\n| 4.4.0-116.140   | 33.2     | generic, lowlatency      |\n| lts-4.4.0-116.140_14.04.1-lts-xenial | 14.04.1  | generic, lowlatency      |\n\nAdditionally, you should install an updated kernel with these fixes and\nreboot at your convienience. \n\nReferences:\n  CVE-2017-13080, CVE-2017-16995\n\n-- \nubuntu-security-announce mailing list\nubuntu-security-announce@lists.ubuntu.com\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz:  Upgraded. \n  This update includes patches to mitigate the WPA2 protocol issues known\n  as \"KRACK\" (Key Reinstallation AttaCK), which may be used to decrypt data,\n  hijack TCP connections, and to forge and inject packets. \n  CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT)\n    Reassociation Request and reinstalling the pairwise encryption key (PTK-TK)\n    while processing it. \n  For more information, see:\n    https://www.krackattacks.com/\n    https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088\n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.0 package:\nd8ecfaadb50b3547967ab53733ffc019  wpa_supplicant-2.6-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\nf25216d28800504ce498705da7c9a825  wpa_supplicant-2.6-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n15c61050e4bab2581757befd86be74c0  wpa_supplicant-2.6-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n49fd537a520338744f7757615556d352  wpa_supplicant-2.6-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\nc5539f40c8510af89be92945f0f80185  wpa_supplicant-2.6-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n4c527ff84fcdfd7839f217bbce2e4ae4  wpa_supplicant-2.6-x86_64-1_slack14.2.txz\n\nSlackware -current package:\n28bd88a54e96368f7a7020c1f5fb67fe  n/wpa_supplicant-2.6-i586-2.txz\n\nSlackware x86_64 -current package:\n464fc6b48d1ac077f47e9a3a8534c160  n/wpa_supplicant-2.6-x86_64-2.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address. \nCVE-2017-13804: @qwertyoruiopz at KJC Research Intl. S.R.L. \nCVE-2017-13785: Ivan Fratric of Google Project Zero\nCVE-2017-13784: Ivan Fratric of Google Project Zero\nCVE-2017-13783: Ivan Fratric of Google Project Zero\nCVE-2017-13788: xisigr of Tencent\u0027s Xuanwu Lab (tencent.com)\nCVE-2017-13798: Ivan Fratric of Google Project Zero\nCVE-2017-13795: Ivan Fratric of Google Project Zero\nCVE-2017-13802: Ivan Fratric of Google Project Zero\nCVE-2017-13792: Ivan Fratric of Google Project Zero\nCVE-2017-13794: Ivan Fratric of Google Project Zero\nCVE-2017-13791: Ivan Fratric of Google Project Zero\nCVE-2017-13796: Ivan Fratric of Google Project Zero\nCVE-2017-13793: Hanul Choi working with Trend Micro\u0027s Zero Day\nInitiative\nCVE-2017-13803: chenqin (ee|) of Ant-financial Light-Year Security\n\nWi-Fi\nAvailable for: Apple TV 4K\nImpact: An attacker in Wi-Fi range may force nonce reuse in WPA\nclients (Key Reinstallation Attacks - KRACK)\nDescription: A logic issue existed in the handling of state\ntransitions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145450"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "PACKETSTORM",
        "id": "145430"
      },
      {
        "db": "PACKETSTORM",
        "id": "144666"
      },
      {
        "db": "PACKETSTORM",
        "id": "145228"
      },
      {
        "db": "PACKETSTORM",
        "id": "144636"
      },
      {
        "db": "PACKETSTORM",
        "id": "147010"
      },
      {
        "db": "PACKETSTORM",
        "id": "145271"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "PACKETSTORM",
        "id": "144828"
      }
    ],
    "trust": 3.69
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-13080",
        "trust": 3.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "101274",
        "trust": 2.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-17420",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1039703",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039572",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039573",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039576",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039577",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039578",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039581",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039585",
        "trust": 1.7
      },
      {
        "db": "SIEMENS",
        "id": "SSA-901333",
        "trust": 1.7
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2017-003",
        "trust": 1.7
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2017-005",
        "trust": 1.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383",
        "trust": 0.8
      },
      {
        "db": "JUNIPER",
        "id": "JSA10827",
        "trust": 0.8
      },
      {
        "db": "DLINK",
        "id": "SAP10075",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.3967",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4125",
        "trust": 0.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-45682",
        "trust": 0.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-18-114-01",
        "trust": 0.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-299-02",
        "trust": 0.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-029-01",
        "trust": 0.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-353-02",
        "trust": 0.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-02",
        "trust": 0.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-318-01",
        "trust": 0.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-325-01",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "52CDA2A8-8175-413F-97BB-CF2E4C75F7C4",
        "trust": 0.2
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144652",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145394",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145450",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144828",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145430",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144666",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145228",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144636",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "147010",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145271",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144663",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145450"
      },
      {
        "db": "PACKETSTORM",
        "id": "144828"
      },
      {
        "db": "PACKETSTORM",
        "id": "145430"
      },
      {
        "db": "PACKETSTORM",
        "id": "144666"
      },
      {
        "db": "PACKETSTORM",
        "id": "145228"
      },
      {
        "db": "PACKETSTORM",
        "id": "144636"
      },
      {
        "db": "PACKETSTORM",
        "id": "147010"
      },
      {
        "db": "PACKETSTORM",
        "id": "145271"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "id": "VAR-201710-0207",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      }
    ],
    "trust": 1.400319345
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      }
    ]
  },
  "last_update_date": "2025-12-22T21:51:09.603000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Patch for WPA2 Wireless Network GTK Group Key Reload Vulnerability (CNVD-2017-30403)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/103821"
      },
      {
        "title": "Multiple WiFi product WPA2 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75497"
      },
      {
        "title": "Red Hat: Important: wpa_supplicant security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172911 - Security Advisory"
      },
      {
        "title": "Ubuntu Security Notice: linux-firmware vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3505-1"
      },
      {
        "title": "Red Hat: Important: wpa_supplicant security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172907 - Security Advisory"
      },
      {
        "title": "Red Hat: CVE-2017-13080",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2017-13080"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-13080"
      },
      {
        "title": "Apple: Wi-Fi Update for Boot Camp 6.4.0",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=4dc3bb86865485e4364fd6b2dc2fc379"
      },
      {
        "title": "Apple: watchOS 4.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=345c3fa8a313cd9a1ced5ef372c465c4"
      },
      {
        "title": "Apple: AirPort Base Station Firmware Update 7.6.9",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=43d8dcf7961e20b6ec02761d12969c19"
      },
      {
        "title": "Apple: AirPort Base Station Firmware Update 7.7.9",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7ca8130f8030911575aa17c0e84114dd"
      },
      {
        "title": "Debian CVElist Bug Report Logs: firmware-brcm80211: BroadPwn vulnerability CVE-2017-9417",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=2e0affd9108e95fa2aa2c706c74cd8a9"
      },
      {
        "title": "Ubuntu Security Notice: wpa vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3455-1"
      },
      {
        "title": "Debian Security Advisories: DSA-3999-1 wpa -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=08990d9925276738bd732fa4d58f9ef0"
      },
      {
        "title": "Apple: tvOS 11.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7a8e908aff7c02a31b2d335766e6d5c2"
      },
      {
        "title": "HP: HPSBHF03582 rev. 2 - KRACK Vulnerability Affecting WPA2 Wireless Security",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03582"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-23] hostapd: man-in-the-middle",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-23"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-22] wpa_supplicant: man-in-the-middle",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-22"
      },
      {
        "title": "HP: HPSBPI03574 rev. 1 - WPA, WPA2 Key Reinstallation Attacks (KRACK attacks) Potential Remote Disclosure of Information: Certain HP Enterprise Printer and MFP products, Certain HP PageWide Printer and MFP Products, HP Jetdirect Accessory Products",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBPI03574"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=6df91267eee9400a24a98876f50ffe84"
      },
      {
        "title": "Apple: iOS 11.2",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=75d972e5e0d4b4019a5bb869f1befb00"
      },
      {
        "title": "HP: HPSBHF03697 rev. 1 - Intel\u00ae PROSet/Wireless WiFi Software November 2020 Security Updates",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03697"
      },
      {
        "title": "Apple: tvOS 11.2",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=8d9ba2a4e31c3f4387eccea1c1dbc99c"
      },
      {
        "title": "Apple: watchOS 4.2",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=8658f9579768b2f61d8a0c0f1d03ed58"
      },
      {
        "title": "Apple: iOS 11.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7814c280e80969d4c4d88f74b13290f2"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014November 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=8c29eb008bb212762e5cfb25c7c5c0d5"
      },
      {
        "title": "Apple: macOS High Sierra 10.13.4, Security Update 2018-002 Sierra, and Security Update 2018-002 El Capitan",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=8e90004e437eabc9a0809772bb0707c4"
      },
      {
        "title": "Cisco: Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20171016-wpa"
      },
      {
        "title": "HP: HPSBHF03571 rev. 6  -  Intel Management Engine Cumulative Security update and fix for WPA2 vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03571"
      },
      {
        "title": "Oracle: Oracle Critical Patch Update Advisory - April 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=4019ca77f50c7a34e4d97833e6f3321e"
      },
      {
        "title": "Apple: macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=870f3f04ef17f7b183f74ae687a1561d"
      },
      {
        "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=7251d5e5f2b1771951980ad7cfde50ba"
      },
      {
        "title": "Oracle: Oracle Critical Patch Update Advisory - January 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=e2a7f287e9acc8c64ab3df71130bc64d"
      },
      {
        "title": "vanhoefm-krackattacks-scripts",
        "trust": 0.1,
        "url": "https://github.com/84KaliPleXon3/vanhoefm-krackattacks-scripts "
      },
      {
        "title": "krankattack",
        "trust": 0.1,
        "url": "https://github.com/DevKosov/krankattack "
      },
      {
        "title": "krackattacks-scripts",
        "trust": 0.1,
        "url": "https://github.com/vanhoefm/krackattacks-scripts "
      },
      {
        "title": "KRACK",
        "trust": 0.1,
        "url": "https://github.com/chinatso/KRACK "
      },
      {
        "title": "krackinfo",
        "trust": 0.1,
        "url": "https://github.com/kristate/krackinfo "
      },
      {
        "title": "nixos-issue-db-example",
        "trust": 0.1,
        "url": "https://github.com/andir/nixos-issue-db-example "
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2017/11/07/android_november_security_update/"
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2017/10/16/wpa2_inscure_krackattack/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-323",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-330",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.5,
        "url": "http://www.securityfocus.com/bid/101274"
      },
      {
        "trust": 3.3,
        "url": "https://source.android.com/security/bulletin/2017-11-01"
      },
      {
        "trust": 2.9,
        "url": "https://www.krackattacks.com/"
      },
      {
        "trust": 2.8,
        "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-007.txt"
      },
      {
        "trust": 2.8,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171016-wpa"
      },
      {
        "trust": 2.8,
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-13080"
      },
      {
        "trust": 2.6,
        "url": "https://access.redhat.com/security/vulnerabilities/kracks"
      },
      {
        "trust": 2.5,
        "url": "http://www.debian.org/security/2017/dsa-3999"
      },
      {
        "trust": 2.1,
        "url": "http://www.kb.cert.org/vuls/id/228519"
      },
      {
        "trust": 2.1,
        "url": "https://access.redhat.com/errata/rhsa-2017:2911"
      },
      {
        "trust": 2.1,
        "url": "https://access.redhat.com/errata/rhsa-2017:2907"
      },
      {
        "trust": 2.0,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
      },
      {
        "trust": 1.8,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039585"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039581"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039578"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039577"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039576"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039573"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039572"
      },
      {
        "trust": 1.7,
        "url": "https://support.lenovo.com/us/en/product_security/len-17420"
      },
      {
        "trust": 1.7,
        "url": "https://security.freebsd.org/advisories/freebsd-sa-17:07.wpa.asc"
      },
      {
        "trust": 1.7,
        "url": "http://www.ubuntu.com/usn/usn-3455-1"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039703"
      },
      {
        "trust": 1.7,
        "url": "https://security.gentoo.org/glsa/201711-03"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208222"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208221"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208220"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208219"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208334"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208327"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208325"
      },
      {
        "trust": 1.7,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html"
      },
      {
        "trust": 1.7,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03792en_us"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2017-005"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2017-003"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html"
      },
      {
        "trust": 1.7,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html"
      },
      {
        "trust": 1.1,
        "url": "https://papers.mathyvanhoef.com/ccs2017.pdf"
      },
      {
        "trust": 1.1,
        "url": "https://w1.fi/security/2017-1/"
      },
      {
        "trust": 1.1,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00101\u0026languageid=en-fr"
      },
      {
        "trust": 1.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13080"
      },
      {
        "trust": 0.8,
        "url": "https://cwe.mitre.org/data/definitions/323.html"
      },
      {
        "trust": 0.8,
        "url": "https://actiontecsupport.zendesk.com/hc/en-us/articles/115005205283-krack-vulnerability"
      },
      {
        "trust": 0.8,
        "url": "https://www3.aerohive.com/support/security-bulletins/product-security-announcement-aerohives-response-to-krack-10162017.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.al-enterprise.com/en/support/security-alert-krack"
      },
      {
        "trust": 0.8,
        "url": "https://support.apple.com/en-gb/ht208222"
      },
      {
        "trust": 0.8,
        "url": "https://security.archlinux.org/avg-447"
      },
      {
        "trust": 0.8,
        "url": "https://www.asus.com/static_webpage/asus-product-security-advisory/"
      },
      {
        "trust": 0.8,
        "url": "https://community.barracudanetworks.com/forum/index.php?/topic/23525-security-advisories/page-2"
      },
      {
        "trust": 0.8,
        "url": "https://lists.centos.org/pipermail/centos-announce/2017-october/022569.html"
      },
      {
        "trust": 0.8,
        "url": "https://community.cypress.com/docs/doc-13871"
      },
      {
        "trust": 0.8,
        "url": "http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10075"
      },
      {
        "trust": 0.8,
        "url": "http://www.dell.com/support/article/sln307822"
      },
      {
        "trust": 0.8,
        "url": "https://github.com/espressif/esp8266_nonos_sdk"
      },
      {
        "trust": 0.8,
        "url": "https://extremeportal.force.com/extrarticledetail?n=000018005"
      },
      {
        "trust": 0.8,
        "url": "https://bodhi.fedoraproject.org/updates/fedora-2017-60bfb576b7"
      },
      {
        "trust": 0.8,
        "url": "http://www.fortiguard.com/psirt/fg-ir-17-196"
      },
      {
        "trust": 0.8,
        "url": "https://www.freebsd.org/security/advisories/freebsd-sa-17:07.wpa.asc"
      },
      {
        "trust": 0.8,
        "url": "https://bugs.gentoo.org/634440"
      },
      {
        "trust": 0.8,
        "url": "https://support.hpe.com/hpsc/doc/public/display?sp4ts.oid=null\u0026doclocale=en_us\u0026docid=emr_na-a00029151en_us"
      },
      {
        "trust": 0.8,
        "url": "https://kb.juniper.net/jsa10827"
      },
      {
        "trust": 0.8,
        "url": "https://support.lenovo.com/ca/en/product_security/len-17420"
      },
      {
        "trust": 0.8,
        "url": "http://www.microchip.com/wwwproducts/en/atwinc1500"
      },
      {
        "trust": 0.8,
        "url": "http://mail-index.netbsd.org/source-changes/2017/10/16/msg088877.html"
      },
      {
        "trust": 0.8,
        "url": "https://kb.netgear.com/000049498/security-advisory-for-wpa-2-vulnerabilities-psv-2017-2826-psv-2017-2836-psv-2017-2837"
      },
      {
        "trust": 0.8,
        "url": "https://forum.peplink.com/t/security-advisory-wpa2-vulnerability-vu-228519/12715"
      },
      {
        "trust": 0.8,
        "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-101617-v1.0.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://www.suse.com/de-de/support/kb/doc/?id=7022107"
      },
      {
        "trust": 0.8,
        "url": "https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---wpa-and-wpa2-vulnerabilities/"
      },
      {
        "trust": 0.8,
        "url": "http://www.slackware.com/changelog/stable.php?cpu=x86_64"
      },
      {
        "trust": 0.8,
        "url": "https://community.sophos.com/kb/en-us/127658"
      },
      {
        "trust": 0.8,
        "url": "https://www.toshibacommerce.com/wps/myportal/%21ut/p/a1/rzrnc8igeiz_sw8egqhjcdmmwr8abw2dqcnfoyqotidrrk399uxrrwotuzgws7a87y6z88iuzmcq2u4uwcnlzypjnjj5-exr_wnhya-laxtrid-j3uchdtb8gylmuw6qzgktovtowsrrqlrs6-8dbeqhwc1mykqnlabgdjlf1yjvn7i5af4qtdwsn2tri7j"
      },
      {
        "trust": 0.8,
        "url": "http://www.toshiba-personalstorage.net/en/news/hdd/ot_notice/20171017.htm"
      },
      {
        "trust": 0.8,
        "url": "http://support.toshiba.com/support/staticcontentdetail?contentid=4015875\u0026isfromtoclink=false"
      },
      {
        "trust": 0.8,
        "url": "https://community.ubnt.com/t5/unifi-updates-blog/firmware-3-9-3-7537-for-uap-usw-has-been-released/ba-p/2099365"
      },
      {
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/usn/usn-3455-1/"
      },
      {
        "trust": 0.8,
        "url": "http://en.miui.com/thread-954223-1-1.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.zebra.com/content/dam/zebra_new_ia/en-us/support-and-downloads/lifeguard-security/krack-security-bulletin.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://www.zyxel.com/support/announcement_wpa2_key_management.shtml"
      },
      {
        "trust": 0.8,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk120938"
      },
      {
        "trust": 0.8,
        "url": "https://community.rsa.com/docs/doc-84103"
      },
      {
        "trust": 0.8,
        "url": "https://support.f5.com/csp/article/k23642330"
      },
      {
        "trust": 0.8,
        "url": "https://forum.mikrotik.com/viewtopic.php?f=21\u0026t=126695"
      },
      {
        "trust": 0.8,
        "url": "https://community.linksys.com/t5/wireless-routers/krack-vulnerability/td-p/1218573"
      },
      {
        "trust": 0.6,
        "url": "https://www.kb.cert.org/vuls/id/228519/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.3967/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4125/"
      },
      {
        "trust": 0.6,
        "url": "https://support.lenovo.com/us/en/product_security/len-45682"
      },
      {
        "trust": 0.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsma-18-114-01"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13077"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13078"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13080"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13082"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13086"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13087"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-13088"
      },
      {
        "trust": 0.4,
        "url": "https://support.apple.com/kb/ht201222"
      },
      {
        "trust": 0.4,
        "url": "https://www.apple.com/support/security/pgp/"
      },
      {
        "trust": 0.3,
        "url": "https://github.com/stevenhoneyman/wpa_gui/tree/master/wpa_supplicant-2.4"
      },
      {
        "trust": 0.3,
        "url": "http://www.wi-fi.org/index.php"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-ie/ht208847"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208334"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208327"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht208325"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-353-02"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2017/dec/msg00009.html"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2017/dec/msg00008.html"
      },
      {
        "trust": 0.3,
        "url": "https://lists.apple.com/archives/security-announce/2018/jul/msg00000.html"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13079"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13081"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2017-13084"
      },
      {
        "trust": 0.3,
        "url": "http://docs.fortinet.com/uploaded/files/3961/fortiap-v5.6.1-release-notes.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-299-02"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-01"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-318-02"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-325-01"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsma-19-029-01"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13078"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13077"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13869"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13861"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13867"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13855"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13868"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13865"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13833"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13862"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13876"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13082"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13087"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13086"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13088"
      },
      {
        "trust": 0.2,
        "url": "https://www.apple.com/itunes/"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13860"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7157"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13874"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13866"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13870"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7156"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13879"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13847"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13856"
      },
      {
        "trust": 0.2,
        "url": "https://www.pgp.com"
      },
      {
        "trust": 0.2,
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13081"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/330.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/3505-1/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.1,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/downloads/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2433"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13798"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13796"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13803"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13793"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13791"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13799"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13802"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13792"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13795"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13785"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13784"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13849"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13804"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13794"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13783"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13788"
      },
      {
        "trust": 0.1,
        "url": "http://www.microsoft.com/info/legalinfo/default.mspx\u003e."
      },
      {
        "trust": 0.1,
        "url": "http://go.microsoft.com/fwlink/?linkid=81184\u003e."
      },
      {
        "trust": 0.1,
        "url": "https://support.microsoft.com/"
      },
      {
        "trust": 0.1,
        "url": "https://technet.microsoft.com/security/dn753714\u003e."
      },
      {
        "trust": 0.1,
        "url": "https://profile.microsoft.com/regsysprofilecenter/subscriptionwizar"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-firmware/1.169.1"
      },
      {
        "trust": 0.1,
        "url": "https://www.ubuntu.com/usn/usn-3505-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-firmware/1.164.2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-firmware/1.157.14"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-firmware/1.127.24"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16995"
      },
      {
        "trust": 0.1,
        "url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13078"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13080"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13082"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13077"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13087"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13081"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13084"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com/gpg-key"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13086"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13088"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13079"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13079"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13084"
      },
      {
        "trust": 0.1,
        "url": "http://osuosl.org)"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145450"
      },
      {
        "db": "PACKETSTORM",
        "id": "144828"
      },
      {
        "db": "PACKETSTORM",
        "id": "145430"
      },
      {
        "db": "PACKETSTORM",
        "id": "144666"
      },
      {
        "db": "PACKETSTORM",
        "id": "145228"
      },
      {
        "db": "PACKETSTORM",
        "id": "144636"
      },
      {
        "db": "PACKETSTORM",
        "id": "147010"
      },
      {
        "db": "PACKETSTORM",
        "id": "145271"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "BID",
        "id": "101274"
      },
      {
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "145450"
      },
      {
        "db": "PACKETSTORM",
        "id": "144828"
      },
      {
        "db": "PACKETSTORM",
        "id": "145430"
      },
      {
        "db": "PACKETSTORM",
        "id": "144666"
      },
      {
        "db": "PACKETSTORM",
        "id": "145228"
      },
      {
        "db": "PACKETSTORM",
        "id": "144636"
      },
      {
        "db": "PACKETSTORM",
        "id": "147010"
      },
      {
        "db": "PACKETSTORM",
        "id": "145271"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-10-17T00:00:00",
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "date": "2017-10-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "BID",
        "id": "101274"
      },
      {
        "date": "2017-10-17T16:52:00",
        "db": "PACKETSTORM",
        "id": "144652"
      },
      {
        "date": "2017-12-13T03:33:33",
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "date": "2017-12-16T05:55:55",
        "db": "PACKETSTORM",
        "id": "145450"
      },
      {
        "date": "2017-11-01T15:44:40",
        "db": "PACKETSTORM",
        "id": "144828"
      },
      {
        "date": "2017-12-15T04:44:44",
        "db": "PACKETSTORM",
        "id": "145430"
      },
      {
        "date": "2017-10-18T10:11:11",
        "db": "PACKETSTORM",
        "id": "144666"
      },
      {
        "date": "2017-12-06T22:22:00",
        "db": "PACKETSTORM",
        "id": "145228"
      },
      {
        "date": "2017-10-16T15:02:22",
        "db": "PACKETSTORM",
        "id": "144636"
      },
      {
        "date": "2018-04-02T20:22:22",
        "db": "PACKETSTORM",
        "id": "147010"
      },
      {
        "date": "2017-12-08T14:44:44",
        "db": "PACKETSTORM",
        "id": "145271"
      },
      {
        "date": "2017-10-18T20:44:00",
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "date": "2017-10-17T13:29:00.397000",
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "date": "2020-11-10T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "date": "2019-02-21T09:00:00",
        "db": "BID",
        "id": "101274"
      },
      {
        "date": "2021-12-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "security feature problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      }
    ],
    "trust": 0.6
  }
}

VAR-201710-1433

Vulnerability from variot - Updated: 2025-12-22 21:15

Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.

Ubuntu Security Notice USN-3430-3 January 04, 2018

dnsmasq regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 ESM

Summary:

USN-3430-2 introduced regression in Dnsmasq.

Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server

Details:

USN-3430-2 fixed several vulnerabilities. The update introduced a new regression that breaks DNS resolution. This update addresses the problem.

We apologize for the inconvenience.

Original advisory details:

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14491)

Felix Wilhelm, Fermin J. (CVE-2017-14492)

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 requests. (CVE-2017-14493)

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. A remote attacker could use this issue to cause Dnsmasq to consume memory, resulting in a denial of service. (CVE-2017-14495)

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14496)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 ESM: dnsmasq=C2=A02.59-4ubuntu0.4 dnsmasq-base2.59-4ubuntu0.4 dnsmasq-utils2.59-4ubuntu0.4

After a standard system update you need to reboot your computer to make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Critical: dnsmasq security update Advisory ID: RHSA-2017:2837-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2837 Issue date: 2017-10-02 CVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494 =====================================================================

  1. Summary:

An update for dnsmasq is now available for Red Hat Enterprise Linux 7.2 Extended Update Support and Red Hat Enterprise Linux 7.3 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.2) - x86_64 Red Hat Enterprise Linux ComputeNode EUS (v. 7.3) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.2) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server EUS (v. 7.3) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.2) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, s390x, x86_64

  1. Description:

The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.

Security Fix(es):

  • A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. (CVE-2017-14491)

  • A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)

  • A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)

  • An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)

Red Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies 1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code 1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code 1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code

  1. Package List:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.2):

Source: dnsmasq-2.66-14.el7_2.2.src.rpm

x86_64: dnsmasq-2.66-14.el7_2.2.x86_64.rpm dnsmasq-debuginfo-2.66-14.el7_2.2.x86_64.rpm

Red Hat Enterprise Linux ComputeNode EUS (v. 7.3):

Source: dnsmasq-2.66-21.el7_3.2.src.rpm

x86_64: dnsmasq-2.66-21.el7_3.2.x86_64.rpm dnsmasq-debuginfo-2.66-21.el7_3.2.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2):

x86_64: dnsmasq-debuginfo-2.66-14.el7_2.2.x86_64.rpm dnsmasq-utils-2.66-14.el7_2.2.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):

x86_64: dnsmasq-debuginfo-2.66-21.el7_3.2.x86_64.rpm dnsmasq-utils-2.66-21.el7_3.2.x86_64.rpm

Red Hat Enterprise Linux Server EUS (v. 7.2):

Source: dnsmasq-2.66-14.el7_2.2.src.rpm

ppc64: dnsmasq-2.66-14.el7_2.2.ppc64.rpm dnsmasq-debuginfo-2.66-14.el7_2.2.ppc64.rpm

ppc64le: dnsmasq-2.66-14.el7_2.2.ppc64le.rpm dnsmasq-debuginfo-2.66-14.el7_2.2.ppc64le.rpm

s390x: dnsmasq-2.66-14.el7_2.2.s390x.rpm dnsmasq-debuginfo-2.66-14.el7_2.2.s390x.rpm

x86_64: dnsmasq-2.66-14.el7_2.2.x86_64.rpm dnsmasq-debuginfo-2.66-14.el7_2.2.x86_64.rpm

Red Hat Enterprise Linux Server EUS (v. 7.3):

Source: dnsmasq-2.66-21.el7_3.2.src.rpm

ppc64: dnsmasq-2.66-21.el7_3.2.ppc64.rpm dnsmasq-debuginfo-2.66-21.el7_3.2.ppc64.rpm

ppc64le: dnsmasq-2.66-21.el7_3.2.ppc64le.rpm dnsmasq-debuginfo-2.66-21.el7_3.2.ppc64le.rpm

s390x: dnsmasq-2.66-21.el7_3.2.s390x.rpm dnsmasq-debuginfo-2.66-21.el7_3.2.s390x.rpm

x86_64: dnsmasq-2.66-21.el7_3.2.x86_64.rpm dnsmasq-debuginfo-2.66-21.el7_3.2.x86_64.rpm

Red Hat Enterprise Linux Server Optional EUS (v. 7.2):

ppc64: dnsmasq-debuginfo-2.66-14.el7_2.2.ppc64.rpm dnsmasq-utils-2.66-14.el7_2.2.ppc64.rpm

ppc64le: dnsmasq-debuginfo-2.66-14.el7_2.2.ppc64le.rpm dnsmasq-utils-2.66-14.el7_2.2.ppc64le.rpm

s390x: dnsmasq-debuginfo-2.66-14.el7_2.2.s390x.rpm dnsmasq-utils-2.66-14.el7_2.2.s390x.rpm

x86_64: dnsmasq-debuginfo-2.66-14.el7_2.2.x86_64.rpm dnsmasq-utils-2.66-14.el7_2.2.x86_64.rpm

Red Hat Enterprise Linux Server Optional EUS (v. 7.3):

ppc64: dnsmasq-debuginfo-2.66-21.el7_3.2.ppc64.rpm dnsmasq-utils-2.66-21.el7_3.2.ppc64.rpm

ppc64le: dnsmasq-debuginfo-2.66-21.el7_3.2.ppc64le.rpm dnsmasq-utils-2.66-21.el7_3.2.ppc64le.rpm

s390x: dnsmasq-debuginfo-2.66-21.el7_3.2.s390x.rpm dnsmasq-utils-2.66-21.el7_3.2.s390x.rpm

x86_64: dnsmasq-debuginfo-2.66-21.el7_3.2.x86_64.rpm dnsmasq-utils-2.66-21.el7_3.2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2017-14491 https://access.redhat.com/security/cve/CVE-2017-14492 https://access.redhat.com/security/cve/CVE-2017-14493 https://access.redhat.com/security/cve/CVE-2017-14494 https://access.redhat.com/security/updates/classification/#critical https://access.redhat.com/security/vulnerabilities/3199382

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFZ0mgAXlSAg2UNWIIRAjO5AKCLm+Q/dlf8ARY5gQ34AkiIeWXCSwCdHYO/ 9aC3xN495X7ocyJg/PeZjNk= =cZi/ -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201710-27


                                       https://security.gentoo.org/

Severity: Normal Title: Dnsmasq: Multiple vulnerabilities Date: October 23, 2017 Bugs: #632692 ID: 201710-27


Synopsis

Multiple vulnerabilities have been found in Dnsmasq, the worst of which may allow remote attackers to execute arbitrary code.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 net-dns/dnsmasq < 2.78 >= 2.78

Description

Multiple vulnerabilities have been discovered in Dnsmasq.

Workaround

There is no known workaround at this time.

Resolution

All Dnsmasq users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.78"

References

[ 1 ] CVE-2017-14491 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491 [ 2 ] CVE-2017-14492 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492 [ 3 ] CVE-2017-14493 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493 [ 4 ] CVE-2017-14494 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494 [ 5 ] CVE-2017-14495 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495 [ 6 ] CVE-2017-14496 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201710-27

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201710-1433",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "opensuse",
        "version": "42.3"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "opensuse",
        "version": "42.2"
      },
      {
        "model": "diskstation manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "synology",
        "version": "6.1"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "arubaos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "8.1.0.4"
      },
      {
        "model": "arubaos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "6.5.3.0"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "eos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "arista",
        "version": "4.17.8m"
      },
      {
        "model": "linux for tegra",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "nvidia",
        "version": "r21.6"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "14.04"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "7.0"
      },
      {
        "model": "scalance m-800",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "5.0"
      },
      {
        "model": "arubaos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "6.5.4.2"
      },
      {
        "model": "arubaos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "6.5.4.0"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "12.04"
      },
      {
        "model": "eos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "arista",
        "version": "4.18"
      },
      {
        "model": "arubaos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "6.3.1.25"
      },
      {
        "model": "eos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "arista",
        "version": "4.17"
      },
      {
        "model": "linux enterprise debuginfo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "arubaos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "6.5.1.9"
      },
      {
        "model": "eos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "arista",
        "version": "4.15"
      },
      {
        "model": "diskstation manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "synology",
        "version": "6.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "17.04"
      },
      {
        "model": "eos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "arista",
        "version": "4.18.4.2f"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "arubaos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "8.1.0.0"
      },
      {
        "model": "ruggedcom rm1224",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "5.0"
      },
      {
        "model": "arubaos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "6.4.4.0"
      },
      {
        "model": "diskstation manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "synology",
        "version": "5.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "geforce experience",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "nvidia",
        "version": "3.10.0.55"
      },
      {
        "model": "router manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "synology",
        "version": "1.1"
      },
      {
        "model": "honor v9 play",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "jimmy-al00ac00b135"
      },
      {
        "model": "dnsmasq",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "thekelleys",
        "version": "2.77"
      },
      {
        "model": "arubaos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "6.4.4.16"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "7.1"
      },
      {
        "model": "linux for tegra",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "nvidia",
        "version": "r24.2.2"
      },
      {
        "model": "arubaos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "6.3.1"
      },
      {
        "model": "geforce experience",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "nvidia",
        "version": "3.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "arubaos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "6.5.0.0"
      },
      {
        "model": "eos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "arista",
        "version": "4.16"
      },
      {
        "model": "scalance w1750d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "6.5.1.5"
      },
      {
        "model": "scalance s615",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "5.0"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "eos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "arista",
        "version": "4.16.13m"
      },
      {
        "model": "arubaos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "arubanetworks",
        "version": "6.5.3.3"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "linux enterprise point of sale",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "thekelleys",
        "version": "2.77"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "technicolor",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zyxel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dnsmasq",
        "version": null
      },
      {
        "model": "ubuntu",
        "scope": null,
        "trust": 0.8,
        "vendor": "canonical",
        "version": null
      },
      {
        "model": "red hat enterprise linux server",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "red hat enterprise linux workstation",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "red hat enterprise linux desktop",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "leap",
        "scope": null,
        "trust": 0.8,
        "vendor": "opensuse",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "dnsmasq",
        "scope": null,
        "trust": 0.8,
        "vendor": "thekelleys",
        "version": null
      },
      {
        "model": "enterprise linux server year extended update support",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "redhat",
        "version": "-47.4"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "17.04"
      },
      {
        "model": "linux lts",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "16.04"
      },
      {
        "model": "linux lts",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "14.04"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.2.2"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.75"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.72"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.71"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.70"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.7"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.65"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.64"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.63"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.62"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.61"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.60"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.6"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.59"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.58"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.57"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.56"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.55"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.54"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.53"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.52"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.51"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.50"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.49"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.48"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.47"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.46"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.45"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.44"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.43"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.42"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.41"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.40"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.4"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.38"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.37"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.36"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.35"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.34"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.33"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.30"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.29"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.28"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.27"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.26"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.25"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.24"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.23"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.22"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.21"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.20"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.2"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.19"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.18"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.17"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.16"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.15"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.14"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.13"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.12"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.11"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.10"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.9"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.8"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.6"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.5"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.4"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.3"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.18"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.17"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.16"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.15"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.14"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.13"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.12"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.11"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.10"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "1.0"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "0.996"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "0.992"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "0.98"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "0.96"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "0.95"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "0.7"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "0.6"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "0.5"
      },
      {
        "model": "dnsmasq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "0.4"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "slackware",
        "version": "14.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "slackware",
        "version": "14.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "slackware",
        "version": "14.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "slackware",
        "version": "13.37"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "slackware",
        "version": "13.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "slackware",
        "version": "13.0"
      },
      {
        "model": "enterprise linux workstation optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux workstation optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.6"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.5"
      },
      {
        "model": "enterprise linux server optional eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "enterprise linux server optional eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.2"
      },
      {
        "model": "enterprise linux server optional eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.5"
      },
      {
        "model": "enterprise linux server optional aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.6"
      },
      {
        "model": "enterprise linux server optional aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.5"
      },
      {
        "model": "enterprise linux server optional aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.4"
      },
      {
        "model": "enterprise linux server optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux server optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux server for arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux server eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "enterprise linux server eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.2"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.6"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.5"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.4"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.2"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.3"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.2"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "enterprise linux server extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.2"
      },
      {
        "model": "enterprise linux server extended update suppor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.3"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.3"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.2"
      },
      {
        "model": "enterprise linux server year extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-47.2"
      },
      {
        "model": "enterprise linux server year extended upd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-47.3"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5"
      },
      {
        "model": "enterprise linux long life server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5.9"
      },
      {
        "model": "enterprise linux hpc node optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux hpc node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux for scientific computing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux for power little endian extended update supp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "enterprise linux for power little endian",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "enterprise linux for power big endian",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux for power little endian extended update suppo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.3"
      },
      {
        "model": "enterprise linux for power little endian extended update suppo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.2"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.3"
      },
      {
        "model": "enterprise linux for power big endian extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.2"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.4"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.3"
      },
      {
        "model": "enterprise linux for ibm z systems extended update support",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "-7.2"
      },
      {
        "model": "enterprise linux for ibm z systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "enterprise linux eus compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.2"
      },
      {
        "model": "enterprise linux desktop optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux computenode optional eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "enterprise linux computenode optional eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.2"
      },
      {
        "model": "enterprise linux computenode optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux computenode eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "enterprise linux computenode eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.2"
      },
      {
        "model": "enterprise linux computenode",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "7"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "6"
      },
      {
        "model": "kubernetes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.7.6"
      },
      {
        "model": "kubernetes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.7"
      },
      {
        "model": "kubernetes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.6.10"
      },
      {
        "model": "kubernetes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.6"
      },
      {
        "model": "kubernetes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.5.7"
      },
      {
        "model": "kubernetes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.5"
      },
      {
        "model": "kubernetes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.2"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.1"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.0.1"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "5.1.1"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "5.0.2"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "4.4.4"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "8.0"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.1.2"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7.0"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6.0"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "fedoraproject",
        "version": "27"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux s/390",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux mips",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux ia-64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux ia-32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux ia-30",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "centos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "centos",
        "version": "7"
      },
      {
        "model": "centos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "centos",
        "version": "6"
      },
      {
        "model": "dnsmasq",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "thekelleys",
        "version": "2.78"
      },
      {
        "model": "kubernetes",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.8"
      },
      {
        "model": "kubernetes",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.7.7"
      },
      {
        "model": "kubernetes",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.6.11"
      },
      {
        "model": "kubernetes",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "kubernetes",
        "version": "1.5.8"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#973527"
      },
      {
        "db": "BID",
        "id": "101085"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008618"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-14491"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Gabriel Campana, Kevin Hamacher and Ron Bowes of the Google Security Team,Felix Wilhelm, Fermin J. Serna",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2017-14491",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-14491",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-14491",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2017-14491",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-14491",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-14491",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201709-747",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-14491",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2017-14491"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008618"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-14491"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. \n===========================================================================\nUbuntu Security Notice USN-3430-3\nJanuary 04, 2018\n\ndnsmasq regression\n===========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\nUSN-3430-2 introduced regression in Dnsmasq. \n\nSoftware Description:\n- dnsmasq: Small caching DNS proxy and DHCP/TFTP server\n\nDetails:\n\nUSN-3430-2 fixed several vulnerabilities. The update introduced a new\nregression that breaks DNS resolution. This update addresses the\nproblem. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. \n(CVE-2017-14491)\n\nFelix Wilhelm, Fermin J. (CVE-2017-14492)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DHCPv6 requests. \n(CVE-2017-14493)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. A remote\nattacker could use this issue to cause Dnsmasq to consume memory,\nresulting in a denial of service. (CVE-2017-14495)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14496)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n dnsmasq=C2=A02.59-4ubuntu0.4\n dnsmasq-base2.59-4ubuntu0.4\n dnsmasq-utils2.59-4ubuntu0.4\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Critical: dnsmasq security update\nAdvisory ID:       RHSA-2017:2837-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2017:2837\nIssue date:        2017-10-02\nCVE Names:         CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 \n                   CVE-2017-14494 \n=====================================================================\n\n1. Summary:\n\nAn update for dnsmasq is now available for Red Hat Enterprise Linux 7.2\nExtended Update Support and Red Hat Enterprise Linux 7.3 Extended Update\nSupport. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.2) - x86_64\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server EUS (v. 7.2) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server EUS (v. 7.3) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 7.2) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name\nServer) forwarder and DHCP (Dynamic Host Configuration Protocol) server. \n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for\nbuilding DNS replies. \n(CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router\nadvertisement (RA) handling code. This issue only affected\nconfigurations using one of these options: enable-ra, ra-only, slaac,\nra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An\nattacker on the local network could send crafted DHCPv6 packets to dnsmasq\ncausing it to forward the contents of process memory, potentially leaking\nsensitive data. (CVE-2017-14494)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. \nSerna (Google Security Team), Gabriel Campana (Google Security Team), Kevin\nHamacher (Google Security Team), and Ron Bowes (Google Security Team) for\nreporting these issues. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies\n1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code\n1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code\n1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code\n\n6. Package List:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.2):\n\nSource:\ndnsmasq-2.66-14.el7_2.2.src.rpm\n\nx86_64:\ndnsmasq-2.66-14.el7_2.2.x86_64.rpm\ndnsmasq-debuginfo-2.66-14.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3):\n\nSource:\ndnsmasq-2.66-21.el7_3.2.src.rpm\n\nx86_64:\ndnsmasq-2.66-21.el7_3.2.x86_64.rpm\ndnsmasq-debuginfo-2.66-21.el7_3.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2):\n\nx86_64:\ndnsmasq-debuginfo-2.66-14.el7_2.2.x86_64.rpm\ndnsmasq-utils-2.66-14.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):\n\nx86_64:\ndnsmasq-debuginfo-2.66-21.el7_3.2.x86_64.rpm\ndnsmasq-utils-2.66-21.el7_3.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.2):\n\nSource:\ndnsmasq-2.66-14.el7_2.2.src.rpm\n\nppc64:\ndnsmasq-2.66-14.el7_2.2.ppc64.rpm\ndnsmasq-debuginfo-2.66-14.el7_2.2.ppc64.rpm\n\nppc64le:\ndnsmasq-2.66-14.el7_2.2.ppc64le.rpm\ndnsmasq-debuginfo-2.66-14.el7_2.2.ppc64le.rpm\n\ns390x:\ndnsmasq-2.66-14.el7_2.2.s390x.rpm\ndnsmasq-debuginfo-2.66-14.el7_2.2.s390x.rpm\n\nx86_64:\ndnsmasq-2.66-14.el7_2.2.x86_64.rpm\ndnsmasq-debuginfo-2.66-14.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.3):\n\nSource:\ndnsmasq-2.66-21.el7_3.2.src.rpm\n\nppc64:\ndnsmasq-2.66-21.el7_3.2.ppc64.rpm\ndnsmasq-debuginfo-2.66-21.el7_3.2.ppc64.rpm\n\nppc64le:\ndnsmasq-2.66-21.el7_3.2.ppc64le.rpm\ndnsmasq-debuginfo-2.66-21.el7_3.2.ppc64le.rpm\n\ns390x:\ndnsmasq-2.66-21.el7_3.2.s390x.rpm\ndnsmasq-debuginfo-2.66-21.el7_3.2.s390x.rpm\n\nx86_64:\ndnsmasq-2.66-21.el7_3.2.x86_64.rpm\ndnsmasq-debuginfo-2.66-21.el7_3.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 7.2):\n\nppc64:\ndnsmasq-debuginfo-2.66-14.el7_2.2.ppc64.rpm\ndnsmasq-utils-2.66-14.el7_2.2.ppc64.rpm\n\nppc64le:\ndnsmasq-debuginfo-2.66-14.el7_2.2.ppc64le.rpm\ndnsmasq-utils-2.66-14.el7_2.2.ppc64le.rpm\n\ns390x:\ndnsmasq-debuginfo-2.66-14.el7_2.2.s390x.rpm\ndnsmasq-utils-2.66-14.el7_2.2.s390x.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.66-14.el7_2.2.x86_64.rpm\ndnsmasq-utils-2.66-14.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 7.3):\n\nppc64:\ndnsmasq-debuginfo-2.66-21.el7_3.2.ppc64.rpm\ndnsmasq-utils-2.66-21.el7_3.2.ppc64.rpm\n\nppc64le:\ndnsmasq-debuginfo-2.66-21.el7_3.2.ppc64le.rpm\ndnsmasq-utils-2.66-21.el7_3.2.ppc64le.rpm\n\ns390x:\ndnsmasq-debuginfo-2.66-21.el7_3.2.s390x.rpm\ndnsmasq-utils-2.66-21.el7_3.2.s390x.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.66-21.el7_3.2.x86_64.rpm\ndnsmasq-utils-2.66-21.el7_3.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-14491\nhttps://access.redhat.com/security/cve/CVE-2017-14492\nhttps://access.redhat.com/security/cve/CVE-2017-14493\nhttps://access.redhat.com/security/cve/CVE-2017-14494\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://access.redhat.com/security/vulnerabilities/3199382\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFZ0mgAXlSAg2UNWIIRAjO5AKCLm+Q/dlf8ARY5gQ34AkiIeWXCSwCdHYO/\n9aC3xN495X7ocyJg/PeZjNk=\n=cZi/\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201710-27\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: Dnsmasq: Multiple vulnerabilities\n     Date: October 23, 2017\n     Bugs: #632692\n       ID: 201710-27\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Dnsmasq, the worst of which\nmay allow remote attackers to execute arbitrary code. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  net-dns/dnsmasq               \u003c 2.78                     \u003e= 2.78 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Dnsmasq. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Dnsmasq users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-dns/dnsmasq-2.78\"\n\nReferences\n==========\n\n[ 1 ] CVE-2017-14491\n      https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491\n[ 2 ] CVE-2017-14492\n      https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492\n[ 3 ] CVE-2017-14493\n      https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493\n[ 4 ] CVE-2017-14494\n      https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494\n[ 5 ] CVE-2017-14495\n      https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495\n[ 6 ] CVE-2017-14496\n      https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201710-27\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2017 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-14491"
      },
      {
        "db": "CERT/CC",
        "id": "VU#973527"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008618"
      },
      {
        "db": "BID",
        "id": "101085"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-14491"
      },
      {
        "db": "PACKETSTORM",
        "id": "145652"
      },
      {
        "db": "PACKETSTORM",
        "id": "144474"
      },
      {
        "db": "PACKETSTORM",
        "id": "144477"
      },
      {
        "db": "PACKETSTORM",
        "id": "144481"
      },
      {
        "db": "PACKETSTORM",
        "id": "144706"
      }
    ],
    "trust": 3.15
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=42941",
        "trust": 0.1,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2017-14491"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-14491",
        "trust": 4.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#973527",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "101085",
        "trust": 2.0
      },
      {
        "db": "BID",
        "id": "101977",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039474",
        "trust": 1.7
      },
      {
        "db": "SIEMENS",
        "id": "SSA-689071",
        "trust": 1.7
      },
      {
        "db": "PACKETSTORM",
        "id": "144480",
        "trust": 1.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "42941",
        "trust": 1.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-332-01",
        "trust": 1.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-24-074-07",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU93453933",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU93656033",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008618",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-747",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-14491",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145652",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144474",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144477",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144481",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144706",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#973527"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-14491"
      },
      {
        "db": "BID",
        "id": "101085"
      },
      {
        "db": "PACKETSTORM",
        "id": "145652"
      },
      {
        "db": "PACKETSTORM",
        "id": "144474"
      },
      {
        "db": "PACKETSTORM",
        "id": "144477"
      },
      {
        "db": "PACKETSTORM",
        "id": "144481"
      },
      {
        "db": "PACKETSTORM",
        "id": "144706"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008618"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-14491"
      }
    ]
  },
  "id": "VAR-201710-1433",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4630627775
  },
  "last_update_date": "2025-12-22T21:15:03.957000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Multiple\u00a0Critical\u00a0and\u00a0Important\u00a0vulnerabilities",
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/usn/USN-3430-1/"
      },
      {
        "title": "Dnsmasq Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92843"
      },
      {
        "title": "Red Hat: Critical: dnsmasq security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172838 - Security Advisory"
      },
      {
        "title": "Red Hat: Critical: dnsmasq security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172841 - Security Advisory"
      },
      {
        "title": "Red Hat: Critical: dnsmasq security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172840 - Security Advisory"
      },
      {
        "title": "Red Hat: Critical: dnsmasq security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172839 - Security Advisory"
      },
      {
        "title": "Red Hat: Critical: dnsmasq security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172837 - Security Advisory"
      },
      {
        "title": "Red Hat: Critical: dnsmasq security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172836 - Security Advisory"
      },
      {
        "title": "Debian CVElist Bug Report Logs: dnsmasq: CVE-2017-13704: Size parameter overflow via large DNS query",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=fa8aad66cae5df51d49e1cdce2fe4a42"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-14491"
      },
      {
        "title": "Ubuntu Security Notice: dnsmasq vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3430-2"
      },
      {
        "title": "Ubuntu Security Notice: dnsmasq regression",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3430-3"
      },
      {
        "title": "Ubuntu Security Notice: dnsmasq vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3430-1"
      },
      {
        "title": "Debian Security Advisories: DSA-3989-1 dnsmasq -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5c18698ecfe74c7de381531f8ed44dcf"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=7f490a104360d6f65bee18ec7bfa18a3"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2019-1251",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2019-1251"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-1] dnsmasq: multiple issues",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-1"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2017-907",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2017-907"
      },
      {
        "title": "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - October 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins\u0026qid=b1921e7bf61366a1d7f889a7cdefa932"
      },
      {
        "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=6283337cd31f81f24d445925f2138c0e"
      },
      {
        "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=7251d5e5f2b1771951980ad7cfde50ba"
      },
      {
        "title": "Kubernetes setup on Amazon AWS using Kops and Ansible",
        "trust": 0.1,
        "url": "https://github.com/suhaad79/aws-k8s-kops-ansible "
      },
      {
        "title": "Kubernetes setup on Amazon AWS using Kops and Ansible",
        "trust": 0.1,
        "url": "https://github.com/calvinkkd/aws-k8s-kkd-ansible "
      },
      {
        "title": "Kubernetes setup on Amazon AWS using Kops and Ansible",
        "trust": 0.1,
        "url": "https://github.com/simonelle/aws-k8s-kops-ansible "
      },
      {
        "title": "Kubernetes setup on Amazon AWS using Kops and Ansible",
        "trust": 0.1,
        "url": "https://github.com/scholzj/aws-k8s-kops-ansible "
      },
      {
        "title": "Kubernetes setup on Amazon AWS using Kops and Ansible",
        "trust": 0.1,
        "url": "https://github.com/bisiman2/aws-k8s-kops-ansible "
      },
      {
        "title": "Kubernetes setup on Amazon AWS using Kops and Ansible",
        "trust": 0.1,
        "url": "https://github.com/honey336/-aws-k8s-kops-ansible "
      },
      {
        "title": "Kubernetes setup on Amazon AWS using Kops and Ansible -1\naws-k8s-kops-ansible\naws-k8s-kops-ansible\naws-k8s-kops-ansible\naws-k8s-kops-ansible",
        "trust": 0.1,
        "url": "https://github.com/Andreadote/aws-k8s-kops-ansible "
      },
      {
        "title": "Kubernetes setup on Amazon AWS using Kops and Ansible",
        "trust": 0.1,
        "url": "https://github.com/RavitejaAdepudi/KopsCluster "
      },
      {
        "title": "Kubernetes setup on Amazon AWS using Kops and Ansible",
        "trust": 0.1,
        "url": "https://github.com/lorerunner/devops_kubenerates_aws "
      },
      {
        "title": "Kaosagnt\u0027s Ansible Everyday Utils",
        "trust": 0.1,
        "url": "https://github.com/kaosagnt/ansible-everyday "
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 "
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/lnick2023/nicenice "
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/qazbnm456/awesome-cve-poc "
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/google-warns-of-dos-and-rce-bugs-in-dnsmasq/128238/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2017-14491"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008618"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      },
      {
        "problemtype": "Buffer error (CWE-119) [NVD evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": " Heap-based buffer overflow (CWE-122) [IPA evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008618"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-14491"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.5,
        "url": "https://www.kb.cert.org/vuls/id/973527"
      },
      {
        "trust": 3.1,
        "url": "https://www.debian.org/security/2017/dsa-3989"
      },
      {
        "trust": 2.9,
        "url": "http://www.securityfocus.com/bid/101085"
      },
      {
        "trust": 2.8,
        "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html"
      },
      {
        "trust": 2.1,
        "url": "https://access.redhat.com/errata/rhsa-2017:2837"
      },
      {
        "trust": 2.0,
        "url": "https://access.redhat.com/security/vulnerabilities/3199382"
      },
      {
        "trust": 2.0,
        "url": "https://access.redhat.com/errata/rhsa-2017:2836"
      },
      {
        "trust": 1.9,
        "url": "https://access.redhat.com/errata/rhsa-2017:2838"
      },
      {
        "trust": 1.8,
        "url": "https://www.exploit-db.com/exploits/42941/"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2017:2840"
      },
      {
        "trust": 1.8,
        "url": "http://www.ubuntu.com/usn/usn-3430-1"
      },
      {
        "trust": 1.8,
        "url": "https://security.gentoo.org/glsa/201710-27"
      },
      {
        "trust": 1.8,
        "url": "http://www.ubuntu.com/usn/usn-3430-3"
      },
      {
        "trust": 1.7,
        "url": "http://www.thekelleys.org.uk/dnsmasq/doc.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039474"
      },
      {
        "trust": 1.7,
        "url": "http://thekelleys.org.uk/dnsmasq/changelog"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2017:2841"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2017:2839"
      },
      {
        "trust": 1.7,
        "url": "http://www.ubuntu.com/usn/usn-3430-2"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html"
      },
      {
        "trust": 1.7,
        "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/101977"
      },
      {
        "trust": 1.7,
        "url": "https://www.synology.com/support/security/synology_sa_17_59_dnsmasq"
      },
      {
        "trust": 1.7,
        "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-005.txt"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4560"
      },
      {
        "trust": 1.7,
        "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html"
      },
      {
        "trust": 1.7,
        "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.com/files/144480/dnsmasq-2-byte-heap-based-overflow.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html"
      },
      {
        "trust": 1.7,
        "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30"
      },
      {
        "trust": 1.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-332-01"
      },
      {
        "trust": 1.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14491"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/security/cve/cve-2017-14491"
      },
      {
        "trust": 1.1,
        "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3ba=commit%3bh=0549c73b7ea6b22a3c49beb4d432f185a81efcbc"
      },
      {
        "trust": 1.1,
        "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html"
      },
      {
        "trust": 1.1,
        "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html"
      },
      {
        "trust": 1.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5mmpcjoyppl4b5rby4u425pwg7eetdtd/"
      },
      {
        "trust": 1.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/yxrz2w6tv6nlujc5nofbsg6pzsmdtypv/"
      },
      {
        "trust": 1.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/527knn34rn2sb6mbjg7cksebwye3tjeb/"
      },
      {
        "trust": 1.0,
        "url": "https://access.redhat.com/security/cve/cve-2017-14492"
      },
      {
        "trust": 1.0,
        "url": "https://access.redhat.com/security/cve/cve-2017-14493"
      },
      {
        "trust": 1.0,
        "url": "https://access.redhat.com/security/cve/cve-2017-14494"
      },
      {
        "trust": 0.9,
        "url": "http://www.thekelleys.org.uk/dnsmasq/changelog"
      },
      {
        "trust": 0.9,
        "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14491.py"
      },
      {
        "trust": 0.9,
        "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14492.py"
      },
      {
        "trust": 0.9,
        "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14493.py"
      },
      {
        "trust": 0.9,
        "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14494.py"
      },
      {
        "trust": 0.9,
        "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14495.py"
      },
      {
        "trust": 0.9,
        "url": "https://github.com/kubernetes/kubernetes/blob/master/changelog.md"
      },
      {
        "trust": 0.9,
        "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2017\u0026m=slackware-security.601472"
      },
      {
        "trust": 0.9,
        "url": "https://source.android.com/security/bulletin/2017-10-01"
      },
      {
        "trust": 0.9,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495410"
      },
      {
        "trust": 0.9,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495411"
      },
      {
        "trust": 0.9,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495412"
      },
      {
        "trust": 0.9,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495415"
      },
      {
        "trust": 0.9,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495416"
      },
      {
        "trust": 0.9,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495510"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/cve/cve-2017-13704"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/cve/cve-2017-14495"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/cve/cve-2017-14496"
      },
      {
        "trust": 0.9,
        "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14496.py"
      },
      {
        "trust": 0.8,
        "url": "https://www.ruckuswireless.com/security"
      },
      {
        "trust": 0.8,
        "url": "https://www.zyxel.com/support/announcement_dnsmasq_vulnerabilities.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu93453933/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu93656033/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-07"
      },
      {
        "trust": 0.6,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5mmpcjoyppl4b5rby4u425pwg7eetdtd/"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409bug1495409"
      },
      {
        "trust": 0.6,
        "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html"
      },
      {
        "trust": 0.6,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/527knn34rn2sb6mbjg7cksebwye3tjeb/"
      },
      {
        "trust": 0.6,
        "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc"
      },
      {
        "trust": 0.6,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/yxrz2w6tv6nlujc5nofbsg6pzsmdtypv/"
      },
      {
        "trust": 0.6,
        "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html"
      },
      {
        "trust": 0.6,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-17-332-01"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409 bug 1495409"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14494"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14492"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14493"
      },
      {
        "trust": 0.3,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/updates/classification/#critical"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14496"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14495"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/787.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/suhaad79/aws-k8s-kops-ansible"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/scholzj/aws-k8s-kops-ansible"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/bugs/1741262"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14495"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14493"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14492"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14491"
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14496"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14494"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#973527"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-14491"
      },
      {
        "db": "BID",
        "id": "101085"
      },
      {
        "db": "PACKETSTORM",
        "id": "145652"
      },
      {
        "db": "PACKETSTORM",
        "id": "144474"
      },
      {
        "db": "PACKETSTORM",
        "id": "144477"
      },
      {
        "db": "PACKETSTORM",
        "id": "144481"
      },
      {
        "db": "PACKETSTORM",
        "id": "144706"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008618"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-14491"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#973527"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-14491"
      },
      {
        "db": "BID",
        "id": "101085"
      },
      {
        "db": "PACKETSTORM",
        "id": "145652"
      },
      {
        "db": "PACKETSTORM",
        "id": "144474"
      },
      {
        "db": "PACKETSTORM",
        "id": "144477"
      },
      {
        "db": "PACKETSTORM",
        "id": "144481"
      },
      {
        "db": "PACKETSTORM",
        "id": "144706"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008618"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-14491"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-10-02T00:00:00",
        "db": "CERT/CC",
        "id": "VU#973527"
      },
      {
        "date": "2017-10-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-14491"
      },
      {
        "date": "2017-10-02T00:00:00",
        "db": "BID",
        "id": "101085"
      },
      {
        "date": "2018-01-04T17:50:40",
        "db": "PACKETSTORM",
        "id": "145652"
      },
      {
        "date": "2017-10-02T08:55:00",
        "db": "PACKETSTORM",
        "id": "144474"
      },
      {
        "date": "2017-10-02T11:11:00",
        "db": "PACKETSTORM",
        "id": "144477"
      },
      {
        "date": "2017-10-03T05:18:12",
        "db": "PACKETSTORM",
        "id": "144481"
      },
      {
        "date": "2017-10-23T13:54:05",
        "db": "PACKETSTORM",
        "id": "144706"
      },
      {
        "date": "2017-09-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      },
      {
        "date": "2017-10-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-008618"
      },
      {
        "date": "2017-10-04T01:29:02.870000",
        "db": "NVD",
        "id": "CVE-2017-14491"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-02-02T00:00:00",
        "db": "CERT/CC",
        "id": "VU#973527"
      },
      {
        "date": "2023-11-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-14491"
      },
      {
        "date": "2017-10-02T00:00:00",
        "db": "BID",
        "id": "101085"
      },
      {
        "date": "2022-04-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      },
      {
        "date": "2024-03-22T07:54:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-008618"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2017-14491"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "145652"
      },
      {
        "db": "PACKETSTORM",
        "id": "144706"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dnsmasq contains multiple vulnerabilities",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#973527"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-747"
      }
    ],
    "trust": 0.6
  }
}