{ "schema_version": "1.4.0", "id": "GHSA-693f-c2wf-7qqc", "modified": "2022-05-17T05:53:37Z", "published": "2022-05-17T05:53:37Z", "aliases": [ "CVE-2008-5230" ], "details": "The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5230" }, { "type": "WEB", "url": "http://arstechnica.com/articles/paedia/wpa-cracked.ars" }, { "type": "WEB", "url": "http://dl.aircrack-ng.org/breakingwepandwpa.pdf" }, { "type": "WEB", "url": "http://lists.immunitysec.com/pipermail/dailydave/2008-November/005413.html" }, { "type": "WEB", "url": "http://radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html" }, { "type": "WEB", "url": "http://trac.aircrack-ng.org/svn/trunk/src/tkiptun-ng.c" }, { "type": "WEB", "url": "http://www.aircrack-ng.org/doku.php?id=tkiptun-ng" }, { "type": "WEB", "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a30036.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/32164" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-11-25T23:30:00Z" } }