Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-5230

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2008-5230
Last Modified 03 Dec 2008 12:00:00
Published 25 Nov 2008 06:30:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2008-5230

Summary

The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.

Vulnerable Systems

Operating System

  • Cisco Ios


References

BID - 32164

CISCO - 20081121 Cisco Response to TKIP Encryption Weakness

MISC - http://www.aircrack-ng.org/doku.php?id=tkiptun-ng

MISC - http://trac.aircrack-ng.org/svn/trunk/src/tkiptun-ng.c

MISC - http://radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html

MLIST - [dailydave] 20081107 All Ur WiFi(WPA) R Belong 2 PacSec

MISC - http://dl.aircrack-ng.org/breakingwepandwpa.pdf

MISC - http://arstechnica.com/articles/paedia/wpa-cracked.ars


Last Updated: 27 May 2016 10:48:44