Vulnerabilities
Vulnerable Software
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
CVSS Score
6.8
EPSS Score
0.011
Published
2017-10-17


Contact Us

Shodan ® - All rights reserved