Insecure Randomness Affecting wpa_supplicant package, versions [0.2.4,2.6]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.94% (83rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-WPASUPPLICANT-2364093
  • published14 Dec 2021
  • disclosed17 Oct 2017
  • creditUnknown

Introduced: 17 Oct 2017

CVE-2017-13086  (opens in a new tab)
CWE-323  (opens in a new tab)
CWE-330  (opens in a new tab)

How to fix?

There is no fixed version for wpa_supplicant.

Overview

Affected versions of this package are vulnerable to Insecure Randomness. Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVSS Scores

version 3.1