VAR-201710-0207

Vulnerability from variot - Updated: 2026-04-10 23:24

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or "KRACK" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). The GTK group key reloading vulnerability exists in the WPA2 wireless network. CVE-2017-13804: @qwertyoruiopz at KJC Research Intl. S.R.L. CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven

Installation note:

Firmware version 7.6.9 is installed on AirPort Express, AirPort Extreme, or AirPort Time Capsule base stations with 802.11n using AirPort Utility for Mac or iOS.

AirPort Utility for Mac is a free download from https://support.apple.com/downloads/ and AirPort Utility for iOS is a free download from the App Store.

Software Description: - linux-firmware: Firmware for Linux kernel drivers

Details:

Mathy Vanhoef discovered that the firmware for several Intel WLAN devices incorrectly handled WPA2 in relation to Wake on WLAN. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256


Title: Microsoft Security Update Releases Issued: October 16, 2017


Summary

The following CVE has undergone a major revision increment.

  • CVE-2017-13080

CVE Revision Information:

CVE-2017-13080

  • Title: CVE-2017-13080 | Windows Wireless WPA Group Key Reinstallation Vulnerability
  • https://portal.msrc.microsoft.com/en-us/security-guidance
  • Reason for Revision: CVE-2017-13080 has been added to the October 2017 security release in lieu of ADV170016, which has been deprecated. CVE-2017-13080 was released as part of a multi-vendor coordinated disclosure. Please see the FAQ for more information.
  • Originally posted: October 16, 2017
  • Updated: N/A
  • CVE Severity Rating: Important
  • Version: 1.0

Other Information

Recognize and avoid fraudulent email to Microsoft customers:

If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at .


THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.


Microsoft respects your privacy. Please read our online Privacy Statement at .

If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: .

These settings will not affect any newsletters youave requested or any mandatory service communications that are considered part of certain Microsoft services.

For legal Information, see: .

This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052

-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) - not licensed for commercial use: www.pgp.com Charset: utf-8

wsFVAwUBWeTb2vsCXwi14Wq8AQimsw//UE92KMajVPARF4zMmfyQnbypCJhwOhsG n7uhJwIF8STYnUDQPfjDPGzmJSDIiQTg3PeewAzg+Ib3GZCsPdUQHMEl/DfGLFWy k814Bh158GDGvWIwDYkIgn1cRrdFP63gVg13ImvgCA2i8KOg9gy1LcnJ1tkIuHAJ bv22fe3zT9PgfLArRpm/nb3qMRnx/VRkTeS80y/RW2a2tkPSzyqLBRgZEP7t+RxJ M4G7cFRS0xpLrPE7PYn8f+tdjA04dWPO77eLOG+gDSpK5mFc8ccdjW2VoKJlRT0I i2HESEZipsuVDd4X3lkl5BigtxdKFTNDIFhE/m3pybDTbjClhjSHF+SR7T8yCOO8 fiXm1Nt0201321dhlNrtxGFV5+Q1lixO0+X7XDGCiZFTECs18vpGrDNZGQGqJ7Hj gmdSCNnfW7tashCXAIUtvoHTzK6v0hLh4ufelvdNgw8+qLUB6Z9RmrHzCHRm/i2p IuCtzp4GlPE0cBz3kUPmS0VYrYddEPS/n/vffeQpfAbbFENclTrEwTTxEYkP/vC0 qh2DNFCKnpvs8EUz/dtAdBuDaF3zuENMf/LJJf1EKOnp06b0JsRYDplKKgICgxrF kpFoAwAE14+KYcEUQhP6/jvDJXmWfMRk60Bsbs0qsfTAsFL7O9z0NrjI5xZEjF3j OYE0vOnWj3g= =2086 -----END PGP SIGNATURE----- . ========================================================================== Kernel Live Patch Security Notice LSN-0036-1 April 2, 2018

linux vulnerability

A security issue affects these releases of Ubuntu:

| Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency |

Summary:

Several security issues were fixed in the kernel. (CVE-2017-13080)

Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel improperly performed sign extension in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16995)

Update instructions:

The problem can be corrected by updating your livepatches to the following versions:

| Kernel | Version | flavors | |-----------------+----------+--------------------------| | 4.4.0-116.140 | 33.2 | generic, lowlatency | | lts-4.4.0-116.140_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |

Additionally, you should install an updated kernel with these fixes and reboot at your convienience.

References: CVE-2017-13080, CVE-2017-16995

-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

APPLE-SA-2017-12-6-2 iOS 11.2

iOS 11.2 addresses the following:

IOKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues were addressed through improved state management. CVE-2017-13847: Ian Beer of Google Project Zero

IOMobileFrameBuffer Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privilege Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13879: Apple

IOSurface Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13861: Ian Beer of Google Project Zero

Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13862: Apple CVE-2017-13876: Ian Beer of Google Project Zero

Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2017-13833: Brandon Azad

Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A type confusion issue was addressed with improved memory handling. CVE-2017-13855: Jann Horn of Google Project Zero

Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13867: Ian Beer of Google Project Zero

Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13865: Ian Beer of Google Project Zero CVE-2017-13868: Brandon Azad CVE-2017-13869: Jann Horn of Google Project Zero

Mail Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Incorrect certificate is used for encryption Description: A S/MIME issue existed in the handling of encrypted email. This issue was addressed through improved selection of the encryption certificate. CVE-2017-13874: an anonymous researcher

Mail Drafts Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker with a privileged network position may be able to intercept mail Description: An encryption issue existed with S/MIME credetials. The issue was addressed with additional checks and user control. CVE-2017-13860: Michael Weishaar of INNEO Solutions GmbH

Wi-Fi Available for: iPhone 6s, iPhone 6s Plus, iPhone 6, iPhone 6 Plus, iPhone SE, iPhone 5s, 12.9-inch iPad Pro 1st generation, iPad Air 2, iPad Air, iPad 5th generation, iPad mini 4, iPad mini 3, iPad mini 2, and iPod touch 6th generation Released for iPhone 7 and later and iPad Pro 9.7-inch (early 2016) and later in iOS 11.1. This was addressed with improved state management. CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven

Installation note:

This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/

iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.

The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.

To check that the iPhone, iPod touch, or iPad has been updated:

  • Navigate to Settings
  • Select General
  • Select About. The version after applying this update will be "11.2".

Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----

iQJdBAEBCgBHFiEEcuX4rtoRe4X62yWlg6PvjDRstEYFAlooN+gpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQg6PvjDRstEYDcQ// Q65i3ww4QzpeKJFL+7HA/S7GjzL01/Gmw0CirxBIdFVuOlOm5w6PKfXl7U+UPcdf jJZoIF7Jc5A34FR0szXHsy17kDwaT2fLGTkDJkdNvw3Utw2/MmmBFuaS4SIs3y/+ rXeLWfvCpaJcOLGdhHzM8ubP/k5MLTFopWvUdNeb1lrxxd91xnqibe4TrSs2dVBj gwEIBVfIWeLNaaEscujIRHxv/7f2szzxORzrZx+kXY/ar5HQMKqdlx9yuMetkuXx mT7dUV0ZkKlD73gJBtsHOkyGVUJWThg/xkGpXv11pTt2P/Xo/rhrucK5lcBuiUeJ NBb9isZmzBOf1rmfR/7cTMr/guY29kqN24+XYFLOiHlvBl43QZv5Hj2JiSyP8jVr LKLtBMk/2JLdSH4sFH9kgJ2kB0NB5raiS9CxsNiNmhftvSt9iB19vybr7B04SVBw hCsTA4HrdHVgbp4PSs4kAR/kpmT4yj0ms6++RCDggqZsk4M1uzagokAukqp3ou/k 0qkbjw1uciRAHlED6NmzrZ/aRWS+ASJAkLLCRE07IHGQJt8g2UUMipnPhsM+jA6u GnBD6cJHaTIdvHPEii5XVdynrsBG7Zb1txZsVUoNaa2jV4JBNihVv0Q2xjDxC5CI vyQU45YrbuD1sgtMoBdJhCznxWnQLt3A4LsKRsDy/00= =/F1Z -----END PGP SIGNATURE-----

.

Alternatively, on your watch, select "My Watch > General > About".

Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz: Upgraded. This update includes patches to mitigate the WPA2 protocol issues known as "KRACK" (Key Reinstallation AttaCK), which may be used to decrypt data, hijack TCP connections, and to forge and inject packets. This is the list of vulnerabilities that are addressed here: CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the 4-way handshake. CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the 4-way handshake. CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake. CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake. For more information, see: https://www.krackattacks.com/ https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088 ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz

Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz

Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz

MD5 signatures: +-------------+

Slackware 14.0 package: d8ecfaadb50b3547967ab53733ffc019 wpa_supplicant-2.6-i486-1_slack14.0.txz

Slackware x86_64 14.0 package: f25216d28800504ce498705da7c9a825 wpa_supplicant-2.6-x86_64-1_slack14.0.txz

Slackware 14.1 package: 15c61050e4bab2581757befd86be74c0 wpa_supplicant-2.6-i486-1_slack14.1.txz

Slackware x86_64 14.1 package: 49fd537a520338744f7757615556d352 wpa_supplicant-2.6-x86_64-1_slack14.1.txz

Slackware 14.2 package: c5539f40c8510af89be92945f0f80185 wpa_supplicant-2.6-i586-1_slack14.2.txz

Slackware x86_64 14.2 package: 4c527ff84fcdfd7839f217bbce2e4ae4 wpa_supplicant-2.6-x86_64-1_slack14.2.txz

Slackware -current package: 28bd88a54e96368f7a7020c1f5fb67fe n/wpa_supplicant-2.6-i586-2.txz

Slackware x86_64 -current package: 464fc6b48d1ac077f47e9a3a8534c160 n/wpa_supplicant-2.6-x86_64-2.txz

Installation instructions: +------------------------+

Upgrade the package as root:

upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAlnnrOgACgkQakRjwEAQIjPgvQCfRcXlhuFjrDNPbEUeZrYLxnkW b+4An0l5cZOdtohI7Fq0NbryWajCOnM2 =5HQM -----END PGP SIGNATURE----- . CVE-2017-7156: an anonymous researcher CVE-2017-7157: an anonymous researcher CVE-2017-13856: Jeonghoon Shin CVE-2017-13870: an anonymous researcher CVE-2017-13866: an anonymous researcher Entry added December 13, 2017

Wi-Fi Available for: Apple TV (4th generation) Released for Apple TV 4K in tvOS 11.1

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.10"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.9"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.3.11"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.8"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.10"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.7"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.7"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.5.8"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.11"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "w1 fi",
        "version": "0.4.9"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.9"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.5"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.1"
      },
      {
        "_id": null,
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.8"
      },
      {
        "_id": null,
        "model": "openstack cloud",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "6"
      },
      {
        "_id": null,
        "model": "linux enterprise desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "12"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.9"
      },
      {
        "_id": null,
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "14.04"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.5"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.9"
      },
      {
        "_id": null,
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.9"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.10"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.11"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.7"
      },
      {
        "_id": null,
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "*"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.11"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.8"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.6"
      },
      {
        "_id": null,
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "10"
      },
      {
        "_id": null,
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.2"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.7"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.6"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.5"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.4"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.8"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.7"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.1"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.10"
      },
      {
        "_id": null,
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.7.3"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.0"
      },
      {
        "_id": null,
        "model": "linux enterprise point of sale",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.4"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.6"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.7"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.10"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.8"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.7.3"
      },
      {
        "_id": null,
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "11.1"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "1.0"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.9"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.6"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.4"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.10"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.10"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.9"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.1"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.8"
      },
      {
        "_id": null,
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "42.2"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.7"
      },
      {
        "_id": null,
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "17.04"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.2.4"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.3.10"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.3"
      },
      {
        "_id": null,
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "10.4"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.1"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.11"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.5"
      },
      {
        "_id": null,
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "12"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.3"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.4.8"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.5.11"
      },
      {
        "_id": null,
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "_id": null,
        "model": "hostapd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.2"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "0.6.8"
      },
      {
        "_id": null,
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "11"
      },
      {
        "_id": null,
        "model": "wpa supplicant",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "42.3"
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "9front",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "adtran",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "avm",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "actiontec",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "aerohive",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "alcatel lucent",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "android open source",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "arch linux",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "aruba",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "asustek computer",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "barracuda",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "broadcom",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cambium",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "centos",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cradlepoint",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cypress semiconductor",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian gnu linux",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "digi",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "edimax computer",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "engenius",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "endian",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "espressif",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "extreme",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "f secure",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fortinet",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "google",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hostap",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ipfire",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "juniper",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lancom",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lede",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lifx",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microchip",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microsoft",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mojo",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nest",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netgear",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "opnsense",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "omnirom",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "open mesh",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "peplink",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "riverbed",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse linux",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung mobile",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware linux",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sonos",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sony",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sophos",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "synology",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "tp link",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "technicolor",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "texas instruments",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba commerce",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba electronic devices storage",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba memory",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "turris omnia",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubiquiti",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubuntu",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "volumio",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "watchguard",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xiaomi",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xirrus",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zebra",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "zyxel",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dd wrt",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "eero",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "pfsense",
        "version": null
      },
      {
        "_id": null,
        "model": "alliance wi-fi protected access 2",
        "scope": null,
        "trust": 0.6,
        "vendor": "wi fi",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "linux desktop",
        "version": "12"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "linux server",
        "version": "11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "14.04"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "16.04"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ubuntu linux",
        "version": "17.04"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "debian linux",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "debian linux",
        "version": "9.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "10.4"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "freebsd",
        "version": "11.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "leap",
        "version": "42.2"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "leap",
        "version": "42.3"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux desktop",
        "version": "7"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux server",
        "version": "7"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.4"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.5"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.6"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.2.8"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.7"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.9"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.3.11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.7"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.8"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.9"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.4.11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.7"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.8"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.9"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.5.11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.8"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.9"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.6.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "0.7.3"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "1.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "1.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.2"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.3"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.4"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.5"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "hostapd",
        "version": "2.6"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.4"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.5"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.6"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.7"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.2.8"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.7"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.8"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.9"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.3.11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.7"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.8"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.9"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.4.11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.7"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.8"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.9"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.5.11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.8"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.9"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.6.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "0.7.3"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "1.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "1.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.2"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.3"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.4"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.5"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wpa supplicant",
        "version": "2.6"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux point of sale",
        "version": "11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "linux server",
        "version": "12"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "openstack cloud",
        "version": "6"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Apple",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "144860"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "148445"
      },
      {
        "db": "PACKETSTORM",
        "id": "144828"
      },
      {
        "db": "PACKETSTORM",
        "id": "145430"
      },
      {
        "db": "PACKETSTORM",
        "id": "145271"
      },
      {
        "db": "PACKETSTORM",
        "id": "144829"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2017-13080",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 5.5,
            "id": "CVE-2017-13080",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.1,
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "CNVD-2017-30403",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.6,
            "id": "CVE-2017-13080",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-13080",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-30403",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201710-383",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-13080",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or \"KRACK\" attacks. WPA (Wi-Fi Protected Access) is a system that protects wireless computer networks (Wi-Fi). The GTK group key reloading vulnerability exists in the WPA2 wireless network. \nCVE-2017-13804: @qwertyoruiopz at KJC Research Intl. S.R.L. \nCVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\n\nInstallation note:\n\nFirmware version 7.6.9 is installed on AirPort Express, AirPort\nExtreme, or AirPort Time Capsule base stations with 802.11n using\nAirPort Utility for Mac or iOS. \n\nAirPort Utility for Mac is a free download from\nhttps://support.apple.com/downloads/ and AirPort Utility for iOS\nis a free download from the App Store. \n\nSoftware Description:\n- linux-firmware: Firmware for Linux kernel drivers\n\nDetails:\n\nMathy Vanhoef discovered that the firmware for several Intel WLAN\ndevices incorrectly handled WPA2 in relation to Wake on WLAN. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n********************************************************************\nTitle: Microsoft Security Update Releases\nIssued: October 16, 2017\n********************************************************************\n\nSummary\n=======\n\nThe following CVE has undergone a major revision increment. \n\n* CVE-2017-13080\n\n\nCVE Revision Information:\n=====================\n\nCVE-2017-13080\n\n - Title: CVE-2017-13080 | Windows Wireless WPA Group Key \n Reinstallation Vulnerability\n - https://portal.msrc.microsoft.com/en-us/security-guidance\n - Reason for Revision: CVE-2017-13080 has been added to the October \n 2017 security release in lieu of ADV170016, which has been \n deprecated. CVE-2017-13080 was released as part of a multi-vendor \n coordinated disclosure. Please see the FAQ for more information. \n - Originally posted: October 16, 2017\n - Updated: N/A \n - CVE Severity Rating: Important\n - Version: 1.0\n\n\nOther Information\n=================\n\nRecognize and avoid fraudulent email to Microsoft customers:\n=============================================================\nIf you receive an email message that claims to be distributing \na Microsoft security update, it is a hoax that may contain \nmalware or pointers to malicious websites. Microsoft does \nnot distribute security updates via email. \n\nThe Microsoft Security Response Center (MSRC) uses PGP to digitally \nsign all security notifications. However, PGP is not required for \nreading security notifications, reading security bulletins, or \ninstalling security updates. You can obtain the MSRC public PGP key\nat . \n\n********************************************************************\nTHE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS\nPROVIDED \"AS IS\" WITHOUT WARRANTY OF ANY KIND. MICROSOFT\nDISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING\nTHE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\nPURPOSE. \nIN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE\nLIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,\nINCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL\nDAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN\nADVISED OF THE POSSIBILITY OF SUCH DAMAGES. \nSOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY\nFOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING\nLIMITATION MAY NOT APPLY. \n********************************************************************\n\nMicrosoft respects your privacy. Please read our online Privacy\nStatement at . \n\nIf you would prefer not to receive future technical security\nnotification alerts by email from Microsoft and its family of\ncompanies please visit the following website to unsubscribe:\n. \n\nThese settings will not affect any newsletters youave requested or\nany mandatory service communications that are considered part of\ncertain Microsoft services. \n\nFor legal Information, see:\n. \n\nThis newsletter was sent by:\nMicrosoft Corporation\n1 Microsoft Way\nRedmond, Washington, USA\n98052\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP Desktop 10.2.0 (Build 1950) - not licensed for commercial use: www.pgp.com\nCharset: utf-8\n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\nOYE0vOnWj3g=\n=2086\n-----END PGP SIGNATURE-----\n. ==========================================================================\nKernel Live Patch Security Notice LSN-0036-1\nApril 2, 2018\n\nlinux vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu:\n\n| Series           | Base kernel  | Arch     | flavors          |\n|------------------+--------------+----------+------------------|\n| Ubuntu 16.04 LTS | 4.4.0        | amd64    | generic          |\n| Ubuntu 16.04 LTS | 4.4.0        | amd64    | lowlatency       |\n| Ubuntu 14.04 LTS | 4.4.0        | amd64    | generic          |\n| Ubuntu 14.04 LTS | 4.4.0        | amd64    | lowlatency       |\n\nSummary:\n\nSeveral security issues were fixed in the kernel. (CVE-2017-13080)\n\nJann Horn discovered that the Berkeley Packet Filter (BPF) implementation\nin the Linux kernel improperly performed sign extension in some situations. \nA local attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2017-16995)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your livepatches to the following\nversions:\n\n| Kernel          | Version  | flavors                  |\n|-----------------+----------+--------------------------|\n| 4.4.0-116.140   | 33.2     | generic, lowlatency      |\n| lts-4.4.0-116.140_14.04.1-lts-xenial | 14.04.1  | generic, lowlatency      |\n\nAdditionally, you should install an updated kernel with these fixes and\nreboot at your convienience. \n\nReferences:\n  CVE-2017-13080, CVE-2017-16995\n\n-- \nubuntu-security-announce mailing list\nubuntu-security-announce@lists.ubuntu.com\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-12-6-2 iOS 11.2\n\niOS 11.2 addresses the following:\n\nIOKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: Multiple memory corruption issues were addressed through\nimproved state management. \nCVE-2017-13847: Ian Beer of Google Project Zero\n\nIOMobileFrameBuffer\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privilege\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13879: Apple\n\nIOSurface\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13861: Ian Beer of Google Project Zero\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13862: Apple\nCVE-2017-13876: Ian Beer of Google Project Zero\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2017-13833: Brandon Azad\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: A type confusion issue was addressed with improved\nmemory handling. \nCVE-2017-13855: Jann Horn of Google Project Zero\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to execute arbitrary\ncode with kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13867: Ian Beer of Google Project Zero\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13865: Ian Beer of Google Project Zero\nCVE-2017-13868: Brandon Azad\nCVE-2017-13869: Jann Horn of Google Project Zero\n\nMail\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Incorrect certificate is used for encryption\nDescription: A S/MIME issue existed in the handling of encrypted\nemail. This issue was addressed through improved selection of the\nencryption certificate. \nCVE-2017-13874: an anonymous researcher\n\nMail Drafts\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An attacker with a privileged network position may be able to\nintercept mail\nDescription: An encryption issue existed with S/MIME credetials. The\nissue was addressed with additional checks and user control. \nCVE-2017-13860: Michael Weishaar of INNEO Solutions GmbH\n\nWi-Fi\nAvailable for: iPhone 6s, iPhone 6s Plus, iPhone 6, iPhone 6 Plus,\niPhone SE, iPhone 5s, 12.9-inch iPad Pro 1st generation, iPad Air 2,\niPad Air, iPad 5th generation, iPad mini 4, iPad mini 3, iPad mini 2,\nand iPod touch 6th generation\nReleased for iPhone 7 and later and iPad Pro 9.7-inch (early 2016)\nand later in iOS 11.1. This was addressed with improved state management. \nCVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom https://www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update\nwill be \"11.2\". \n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nvyQU45YrbuD1sgtMoBdJhCznxWnQLt3A4LsKRsDy/00=\n=/F1Z\n-----END PGP SIGNATURE-----\n\n\n\n. \n\nAlternatively, on your watch, select \"My Watch \u003e General \u003e About\". \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz:  Upgraded. \n  This update includes patches to mitigate the WPA2 protocol issues known\n  as \"KRACK\" (Key Reinstallation AttaCK), which may be used to decrypt data,\n  hijack TCP connections, and to forge and inject packets. This is the\n  list of vulnerabilities that are addressed here:\n  CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the\n    4-way handshake. \n  CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the 4-way\n    handshake. \n  CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group\n    key handshake. \n  CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT)\n    Reassociation Request and reinstalling the pairwise encryption key (PTK-TK)\n    while processing it. \n  CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake. \n  CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS)\n    PeerKey (TPK) key in the TDLS handshake. \n  For more information, see:\n    https://www.krackattacks.com/\n    https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088\n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/wpa_supplicant-2.6-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/wpa_supplicant-2.6-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.6-i586-2.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.6-x86_64-2.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.0 package:\nd8ecfaadb50b3547967ab53733ffc019  wpa_supplicant-2.6-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\nf25216d28800504ce498705da7c9a825  wpa_supplicant-2.6-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n15c61050e4bab2581757befd86be74c0  wpa_supplicant-2.6-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n49fd537a520338744f7757615556d352  wpa_supplicant-2.6-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\nc5539f40c8510af89be92945f0f80185  wpa_supplicant-2.6-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n4c527ff84fcdfd7839f217bbce2e4ae4  wpa_supplicant-2.6-x86_64-1_slack14.2.txz\n\nSlackware -current package:\n28bd88a54e96368f7a7020c1f5fb67fe  n/wpa_supplicant-2.6-i586-2.txz\n\nSlackware x86_64 -current package:\n464fc6b48d1ac077f47e9a3a8534c160  n/wpa_supplicant-2.6-x86_64-2.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg wpa_supplicant-2.6-i586-1_slack14.2.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address.      |\n+------------------------------------------------------------------------+\n-----BEGIN PGP SIGNATURE-----\n\niEYEARECAAYFAlnnrOgACgkQakRjwEAQIjPgvQCfRcXlhuFjrDNPbEUeZrYLxnkW\nb+4An0l5cZOdtohI7Fq0NbryWajCOnM2\n=5HQM\n-----END PGP SIGNATURE-----\n. \nCVE-2017-7156: an anonymous researcher\nCVE-2017-7157: an anonymous researcher\nCVE-2017-13856: Jeonghoon Shin\nCVE-2017-13870: an anonymous researcher\nCVE-2017-13866: an anonymous researcher\nEntry added December 13, 2017\n\nWi-Fi\nAvailable for: Apple TV (4th generation)\nReleased for Apple TV 4K in tvOS 11.1",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "PACKETSTORM",
        "id": "144860"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "148445"
      },
      {
        "db": "PACKETSTORM",
        "id": "144828"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "PACKETSTORM",
        "id": "144666"
      },
      {
        "db": "PACKETSTORM",
        "id": "145228"
      },
      {
        "db": "PACKETSTORM",
        "id": "144636"
      },
      {
        "db": "PACKETSTORM",
        "id": "147010"
      },
      {
        "db": "PACKETSTORM",
        "id": "145271"
      },
      {
        "db": "PACKETSTORM",
        "id": "144829"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "PACKETSTORM",
        "id": "145430"
      }
    ],
    "trust": 3.51
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-13080",
        "trust": 3.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519",
        "trust": 3.1
      },
      {
        "db": "LENOVO",
        "id": "LEN-17420",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "101274",
        "trust": 2.3
      },
      {
        "db": "SECTRACK",
        "id": "1039703",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039572",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039573",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039576",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039577",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039578",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039581",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1039585",
        "trust": 1.7
      },
      {
        "db": "SIEMENS",
        "id": "SSA-901333",
        "trust": 1.7
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2017-003",
        "trust": 1.7
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2017-005",
        "trust": 1.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383",
        "trust": 0.8
      },
      {
        "db": "JUNIPER",
        "id": "JSA10827",
        "trust": 0.8
      },
      {
        "db": "DLINK",
        "id": "SAP10075",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.3967",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4125",
        "trust": 0.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-45682",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "52CDA2A8-8175-413F-97BB-CF2E4C75F7C4",
        "trust": 0.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-18-114-01",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144860",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145394",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "148445",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144828",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145430",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144666",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145228",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144636",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "147010",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145271",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144829",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144663",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "PACKETSTORM",
        "id": "144860"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "148445"
      },
      {
        "db": "PACKETSTORM",
        "id": "144828"
      },
      {
        "db": "PACKETSTORM",
        "id": "145430"
      },
      {
        "db": "PACKETSTORM",
        "id": "144666"
      },
      {
        "db": "PACKETSTORM",
        "id": "145228"
      },
      {
        "db": "PACKETSTORM",
        "id": "144636"
      },
      {
        "db": "PACKETSTORM",
        "id": "147010"
      },
      {
        "db": "PACKETSTORM",
        "id": "145271"
      },
      {
        "db": "PACKETSTORM",
        "id": "144829"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "id": "VAR-201710-0207",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      }
    ],
    "trust": 1.6125
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      }
    ]
  },
  "last_update_date": "2026-04-10T23:24:45.096000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Patch for WPA2 Wireless Network GTK Group Key Reload Vulnerability (CNVD-2017-30403)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/103821"
      },
      {
        "title": "Multiple WiFi product WPA2 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75497"
      },
      {
        "title": "Red Hat: Important: wpa_supplicant security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172911 - Security Advisory"
      },
      {
        "title": "Ubuntu Security Notice: linux-firmware vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3505-1"
      },
      {
        "title": "Red Hat: Important: wpa_supplicant security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172907 - Security Advisory"
      },
      {
        "title": "Red Hat: CVE-2017-13080",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2017-13080"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-13080"
      },
      {
        "title": "Apple: Wi-Fi Update for Boot Camp 6.4.0",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=4dc3bb86865485e4364fd6b2dc2fc379"
      },
      {
        "title": "Apple: watchOS 4.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=345c3fa8a313cd9a1ced5ef372c465c4"
      },
      {
        "title": "Apple: AirPort Base Station Firmware Update 7.6.9",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=43d8dcf7961e20b6ec02761d12969c19"
      },
      {
        "title": "Apple: AirPort Base Station Firmware Update 7.7.9",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7ca8130f8030911575aa17c0e84114dd"
      },
      {
        "title": "Debian CVElist Bug Report Logs: firmware-brcm80211: BroadPwn vulnerability CVE-2017-9417",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=2e0affd9108e95fa2aa2c706c74cd8a9"
      },
      {
        "title": "Ubuntu Security Notice: wpa vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3455-1"
      },
      {
        "title": "Debian Security Advisories: DSA-3999-1 wpa -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=08990d9925276738bd732fa4d58f9ef0"
      },
      {
        "title": "Apple: tvOS 11.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7a8e908aff7c02a31b2d335766e6d5c2"
      },
      {
        "title": "HP: HPSBHF03582 rev. 2 - KRACK Vulnerability Affecting WPA2 Wireless Security",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03582"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-23] hostapd: man-in-the-middle",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-23"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201710-22] wpa_supplicant: man-in-the-middle",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-22"
      },
      {
        "title": "HP: HPSBPI03574 rev. 1 - WPA, WPA2 Key Reinstallation Attacks (KRACK attacks) Potential Remote Disclosure of Information: Certain HP Enterprise Printer and MFP products, Certain HP PageWide Printer and MFP Products, HP Jetdirect Accessory Products",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBPI03574"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=6df91267eee9400a24a98876f50ffe84"
      },
      {
        "title": "Apple: iOS 11.2",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=75d972e5e0d4b4019a5bb869f1befb00"
      },
      {
        "title": "HP: HPSBHF03697 rev. 1 - Intel\u00ae PROSet/Wireless WiFi Software November 2020 Security Updates",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03697"
      },
      {
        "title": "Apple: tvOS 11.2",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=8d9ba2a4e31c3f4387eccea1c1dbc99c"
      },
      {
        "title": "Apple: watchOS 4.2",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=8658f9579768b2f61d8a0c0f1d03ed58"
      },
      {
        "title": "Apple: iOS 11.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7814c280e80969d4c4d88f74b13290f2"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014November 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=8c29eb008bb212762e5cfb25c7c5c0d5"
      },
      {
        "title": "Apple: macOS High Sierra 10.13.4, Security Update 2018-002 Sierra, and Security Update 2018-002 El Capitan",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=8e90004e437eabc9a0809772bb0707c4"
      },
      {
        "title": "Cisco: Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20171016-wpa"
      },
      {
        "title": "HP: HPSBHF03571 rev. 6  -  Intel Management Engine Cumulative Security update and fix for WPA2 vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03571"
      },
      {
        "title": "Oracle: Oracle Critical Patch Update Advisory - April 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=4019ca77f50c7a34e4d97833e6f3321e"
      },
      {
        "title": "Apple: macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=870f3f04ef17f7b183f74ae687a1561d"
      },
      {
        "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=7251d5e5f2b1771951980ad7cfde50ba"
      },
      {
        "title": "Oracle: Oracle Critical Patch Update Advisory - January 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=e2a7f287e9acc8c64ab3df71130bc64d"
      },
      {
        "title": "vanhoefm-krackattacks-scripts",
        "trust": 0.1,
        "url": "https://github.com/84KaliPleXon3/vanhoefm-krackattacks-scripts "
      },
      {
        "title": "krankattack",
        "trust": 0.1,
        "url": "https://github.com/DevKosov/krankattack "
      },
      {
        "title": "krackattacks-scripts",
        "trust": 0.1,
        "url": "https://github.com/vanhoefm/krackattacks-scripts "
      },
      {
        "title": "KRACK",
        "trust": 0.1,
        "url": "https://github.com/chinatso/KRACK "
      },
      {
        "title": "krackinfo",
        "trust": 0.1,
        "url": "https://github.com/kristate/krackinfo "
      },
      {
        "title": "nixos-issue-db-example",
        "trust": 0.1,
        "url": "https://github.com/andir/nixos-issue-db-example "
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2017/11/07/android_november_security_update/"
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2017/10/16/wpa2_inscure_krackattack/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-323",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-330",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.5,
        "url": "http://www.securityfocus.com/bid/101274"
      },
      {
        "trust": 3.3,
        "url": "https://source.android.com/security/bulletin/2017-11-01"
      },
      {
        "trust": 2.6,
        "url": "https://www.krackattacks.com/"
      },
      {
        "trust": 2.5,
        "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-007.txt"
      },
      {
        "trust": 2.5,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171016-wpa"
      },
      {
        "trust": 2.5,
        "url": "http://www.debian.org/security/2017/dsa-3999"
      },
      {
        "trust": 2.5,
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-13080"
      },
      {
        "trust": 2.5,
        "url": "https://access.redhat.com/security/vulnerabilities/kracks"
      },
      {
        "trust": 1.8,
        "url": "http://www.kb.cert.org/vuls/id/228519"
      },
      {
        "trust": 1.8,
        "url": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2017:2911"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039585"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039581"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039578"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039577"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039576"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039573"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039572"
      },
      {
        "trust": 1.7,
        "url": "https://support.lenovo.com/us/en/product_security/len-17420"
      },
      {
        "trust": 1.7,
        "url": "https://security.freebsd.org/advisories/freebsd-sa-17:07.wpa.asc"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2017:2907"
      },
      {
        "trust": 1.7,
        "url": "http://www.ubuntu.com/usn/usn-3455-1"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039703"
      },
      {
        "trust": 1.7,
        "url": "https://security.gentoo.org/glsa/201711-03"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208222"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208221"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208220"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208219"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208334"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208327"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208325"
      },
      {
        "trust": 1.7,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
      },
      {
        "trust": 1.7,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03792en_us"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2017-005"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2017-003"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html"
      },
      {
        "trust": 1.7,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html"
      },
      {
        "trust": 1.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13080"
      },
      {
        "trust": 0.8,
        "url": "https://cwe.mitre.org/data/definitions/323.html"
      },
      {
        "trust": 0.8,
        "url": "https://papers.mathyvanhoef.com/ccs2017.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://actiontecsupport.zendesk.com/hc/en-us/articles/115005205283-krack-vulnerability"
      },
      {
        "trust": 0.8,
        "url": "https://www3.aerohive.com/support/security-bulletins/product-security-announcement-aerohives-response-to-krack-10162017.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.al-enterprise.com/en/support/security-alert-krack"
      },
      {
        "trust": 0.8,
        "url": "https://support.apple.com/en-gb/ht208222"
      },
      {
        "trust": 0.8,
        "url": "https://security.archlinux.org/avg-447"
      },
      {
        "trust": 0.8,
        "url": "https://www.asus.com/static_webpage/asus-product-security-advisory/"
      },
      {
        "trust": 0.8,
        "url": "https://community.barracudanetworks.com/forum/index.php?/topic/23525-security-advisories/page-2"
      },
      {
        "trust": 0.8,
        "url": "https://lists.centos.org/pipermail/centos-announce/2017-october/022569.html"
      },
      {
        "trust": 0.8,
        "url": "https://community.cypress.com/docs/doc-13871"
      },
      {
        "trust": 0.8,
        "url": "http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10075"
      },
      {
        "trust": 0.8,
        "url": "http://www.dell.com/support/article/sln307822"
      },
      {
        "trust": 0.8,
        "url": "https://github.com/espressif/esp8266_nonos_sdk"
      },
      {
        "trust": 0.8,
        "url": "https://extremeportal.force.com/extrarticledetail?n=000018005"
      },
      {
        "trust": 0.8,
        "url": "https://bodhi.fedoraproject.org/updates/fedora-2017-60bfb576b7"
      },
      {
        "trust": 0.8,
        "url": "http://www.fortiguard.com/psirt/fg-ir-17-196"
      },
      {
        "trust": 0.8,
        "url": "https://www.freebsd.org/security/advisories/freebsd-sa-17:07.wpa.asc"
      },
      {
        "trust": 0.8,
        "url": "https://bugs.gentoo.org/634440"
      },
      {
        "trust": 0.8,
        "url": "https://support.hpe.com/hpsc/doc/public/display?sp4ts.oid=null\u0026doclocale=en_us\u0026docid=emr_na-a00029151en_us"
      },
      {
        "trust": 0.8,
        "url": "https://w1.fi/security/2017-1/"
      },
      {
        "trust": 0.8,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00101\u0026languageid=en-fr"
      },
      {
        "trust": 0.8,
        "url": "https://kb.juniper.net/jsa10827"
      },
      {
        "trust": 0.8,
        "url": "https://support.lenovo.com/ca/en/product_security/len-17420"
      },
      {
        "trust": 0.8,
        "url": "http://www.microchip.com/wwwproducts/en/atwinc1500"
      },
      {
        "trust": 0.8,
        "url": "http://mail-index.netbsd.org/source-changes/2017/10/16/msg088877.html"
      },
      {
        "trust": 0.8,
        "url": "https://kb.netgear.com/000049498/security-advisory-for-wpa-2-vulnerabilities-psv-2017-2826-psv-2017-2836-psv-2017-2837"
      },
      {
        "trust": 0.8,
        "url": "https://forum.peplink.com/t/security-advisory-wpa2-vulnerability-vu-228519/12715"
      },
      {
        "trust": 0.8,
        "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-101617-v1.0.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://www.suse.com/de-de/support/kb/doc/?id=7022107"
      },
      {
        "trust": 0.8,
        "url": "https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---wpa-and-wpa2-vulnerabilities/"
      },
      {
        "trust": 0.8,
        "url": "http://www.slackware.com/changelog/stable.php?cpu=x86_64"
      },
      {
        "trust": 0.8,
        "url": "https://community.sophos.com/kb/en-us/127658"
      },
      {
        "trust": 0.8,
        "url": "https://www.toshibacommerce.com/wps/myportal/%21ut/p/a1/rzrnc8igeiz_sw8egqhjcdmmwr8abw2dqcnfoyqotidrrk399uxrrwotuzgws7a87y6z88iuzmcq2u4uwcnlzypjnjj5-exr_wnhya-laxtrid-j3uchdtb8gylmuw6qzgktovtowsrrqlrs6-8dbeqhwc1mykqnlabgdjlf1yjvn7i5af4qtdwsn2tri7j"
      },
      {
        "trust": 0.8,
        "url": "http://www.toshiba-personalstorage.net/en/news/hdd/ot_notice/20171017.htm"
      },
      {
        "trust": 0.8,
        "url": "http://support.toshiba.com/support/staticcontentdetail?contentid=4015875\u0026isfromtoclink=false"
      },
      {
        "trust": 0.8,
        "url": "https://community.ubnt.com/t5/unifi-updates-blog/firmware-3-9-3-7537-for-uap-usw-has-been-released/ba-p/2099365"
      },
      {
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/usn/usn-3455-1/"
      },
      {
        "trust": 0.8,
        "url": "http://en.miui.com/thread-954223-1-1.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.zebra.com/content/dam/zebra_new_ia/en-us/support-and-downloads/lifeguard-security/krack-security-bulletin.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://www.zyxel.com/support/announcement_wpa2_key_management.shtml"
      },
      {
        "trust": 0.8,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk120938"
      },
      {
        "trust": 0.8,
        "url": "https://community.rsa.com/docs/doc-84103"
      },
      {
        "trust": 0.8,
        "url": "https://support.f5.com/csp/article/k23642330"
      },
      {
        "trust": 0.8,
        "url": "https://forum.mikrotik.com/viewtopic.php?f=21\u0026t=126695"
      },
      {
        "trust": 0.8,
        "url": "https://community.linksys.com/t5/wireless-routers/krack-vulnerability/td-p/1218573"
      },
      {
        "trust": 0.6,
        "url": "https://www.kb.cert.org/vuls/id/228519/"
      },
      {
        "trust": 0.6,
        "url": "https://www.apple.com/support/security/pgp/"
      },
      {
        "trust": 0.6,
        "url": "https://support.apple.com/kb/ht201222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.3967/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4125/"
      },
      {
        "trust": 0.6,
        "url": "https://support.lenovo.com/us/en/product_security/len-45682"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13804"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13799"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13849"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13077"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13078"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13795"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13783"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13803"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13791"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13788"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13784"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13796"
      },
      {
        "trust": 0.2,
        "url": "https://www.apple.com/itunes/"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13792"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13785"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13798"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13802"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13793"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13794"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13865"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13868"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13876"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13862"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13869"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13833"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13861"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13867"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13855"
      },
      {
        "trust": 0.2,
        "url": "https://www.pgp.com"
      },
      {
        "trust": 0.2,
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13081"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/330.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/3505-1/"
      },
      {
        "trust": 0.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsma-18-114-01"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7113"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13844"
      },
      {
        "trust": 0.1,
        "url": "https://nmap.org/mailman/listinfo/fulldisclosure"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13805"
      },
      {
        "trust": 0.1,
        "url": "http://seclists.org/fulldisclosure/"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/downloads/"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/kb/ht208038"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13866"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7156"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13856"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13870"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7157"
      },
      {
        "trust": 0.1,
        "url": "http://www.microsoft.com/info/legalinfo/default.mspx\u003e."
      },
      {
        "trust": 0.1,
        "url": "http://go.microsoft.com/fwlink/?linkid=81184\u003e."
      },
      {
        "trust": 0.1,
        "url": "https://support.microsoft.com/"
      },
      {
        "trust": 0.1,
        "url": "https://technet.microsoft.com/security/dn753714\u003e."
      },
      {
        "trust": 0.1,
        "url": "https://profile.microsoft.com/regsysprofilecenter/subscriptionwizar"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-firmware/1.169.1"
      },
      {
        "trust": 0.1,
        "url": "https://www.ubuntu.com/usn/usn-3505-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-firmware/1.164.2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-firmware/1.157.14"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-firmware/1.127.24"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16995"
      },
      {
        "trust": 0.1,
        "url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13847"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13860"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13879"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13874"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/kb/ht204641"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13078"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13080"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13082"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13077"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13087"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13081"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13084"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com/gpg-key"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13086"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13082"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13087"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13086"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13088"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13079"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13079"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13088"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13084"
      },
      {
        "trust": 0.1,
        "url": "http://osuosl.org)"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080"
      },
      {
        "db": "PACKETSTORM",
        "id": "144860"
      },
      {
        "db": "PACKETSTORM",
        "id": "145394"
      },
      {
        "db": "PACKETSTORM",
        "id": "148445"
      },
      {
        "db": "PACKETSTORM",
        "id": "144828"
      },
      {
        "db": "PACKETSTORM",
        "id": "145430"
      },
      {
        "db": "PACKETSTORM",
        "id": "144666"
      },
      {
        "db": "PACKETSTORM",
        "id": "145228"
      },
      {
        "db": "PACKETSTORM",
        "id": "144636"
      },
      {
        "db": "PACKETSTORM",
        "id": "147010"
      },
      {
        "db": "PACKETSTORM",
        "id": "145271"
      },
      {
        "db": "PACKETSTORM",
        "id": "144829"
      },
      {
        "db": "PACKETSTORM",
        "id": "144663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13080"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4",
        "ident": null
      },
      {
        "db": "CERT/CC",
        "id": "VU#228519",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-30403",
        "ident": null
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-13080",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "144860",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "145394",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "148445",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "144828",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "145430",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "144666",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "145228",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "144636",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "147010",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "145271",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "144829",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "144663",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2017-13080",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2017-10-17T00:00:00",
        "db": "IVD",
        "id": "52cda2a8-8175-413f-97bb-cf2e4c75f7c4",
        "ident": null
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#228519",
        "ident": null
      },
      {
        "date": "2017-10-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-30403",
        "ident": null
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-13080",
        "ident": null
      },
      {
        "date": "2017-11-02T23:31:30",
        "db": "PACKETSTORM",
        "id": "144860",
        "ident": null
      },
      {
        "date": "2017-12-13T03:33:33",
        "db": "PACKETSTORM",
        "id": "145394",
        "ident": null
      },
      {
        "date": "2018-07-05T23:02:22",
        "db": "PACKETSTORM",
        "id": "148445",
        "ident": null
      },
      {
        "date": "2017-11-01T15:44:40",
        "db": "PACKETSTORM",
        "id": "144828",
        "ident": null
      },
      {
        "date": "2017-12-15T04:44:44",
        "db": "PACKETSTORM",
        "id": "145430",
        "ident": null
      },
      {
        "date": "2017-10-18T10:11:11",
        "db": "PACKETSTORM",
        "id": "144666",
        "ident": null
      },
      {
        "date": "2017-12-06T22:22:00",
        "db": "PACKETSTORM",
        "id": "145228",
        "ident": null
      },
      {
        "date": "2017-10-16T15:02:22",
        "db": "PACKETSTORM",
        "id": "144636",
        "ident": null
      },
      {
        "date": "2018-04-02T20:22:22",
        "db": "PACKETSTORM",
        "id": "147010",
        "ident": null
      },
      {
        "date": "2017-12-08T14:44:44",
        "db": "PACKETSTORM",
        "id": "145271",
        "ident": null
      },
      {
        "date": "2017-11-01T15:46:36",
        "db": "PACKETSTORM",
        "id": "144829",
        "ident": null
      },
      {
        "date": "2017-10-18T20:44:00",
        "db": "PACKETSTORM",
        "id": "144663",
        "ident": null
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-383",
        "ident": null
      },
      {
        "date": "2017-10-17T13:29:00.397000",
        "db": "NVD",
        "id": "CVE-2017-13080",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2017-11-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#228519",
        "ident": null
      },
      {
        "date": "2017-10-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-30403",
        "ident": null
      },
      {
        "date": "2020-11-10T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-13080",
        "ident": null
      },
      {
        "date": "2021-12-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-383",
        "ident": null
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2017-13080",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#228519"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "security feature problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-383"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…