### [CVE-2017-13084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084) ![](https://img.shields.io/static/v1?label=Product&message=Wi-Fi%20Protected%20Access%20(WPA%20and%20WPA2)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption&color=brighgreen) ### Description Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. ### POC #### Reference - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt - http://www.kb.cert.org/vuls/id/228519 - https://hackerone.com/reports/286740 - https://support.lenovo.com/us/en/product_security/LEN-17420 - https://www.krackattacks.com/ #### Github - https://github.com/andir/nixos-issue-db-example - https://github.com/chinatso/KRACK - https://github.com/giterlizzi/secdb-feeds - https://github.com/kristate/krackinfo - https://github.com/merlinepedra/KRACK