Vulnerability
CVE-2017-13077
Component: WIFI
Location: FIRMWARE
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Impact
Severity (Manufact.)
N/A
Severity (NIST)
6.8
Severity (Android)
N/A
Chipsets
30
Devices
1512
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
MSM8909 | Snapdragon 210 | Qualcomm |
MSM8909AA | Snapdragon 212 | Qualcomm |
MSM8916 | Snapdragon 410 | Qualcomm |
MSM8929 | Snapdragon 415 | Qualcomm |
MSM8917 | Snapdragon 425 | Qualcomm |
MSM8920 | Snapdragon 427 | Qualcomm |
MSM8937 | Snapdragon 430 | Qualcomm |
MSM8940 | Snapdragon 435 | Qualcomm |
SDM429 | Snapdragon 429 | Qualcomm |
SDM439 | Snapdragon 439 | Qualcomm |
30 of 30 row(s) shown.
Rows per page
Page 1 of 3
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2014
Reported:
Aug 25, 2017
Advisory Published:
Sep 4, 2018
CVE Published:
Oct 17, 2017
Android Patch Level:
Aug 2018