The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2008-11-25T23:00:00Z
Updated: 2024-09-17T02:31:10.603Z
Reserved: 2008-11-25T00:00:00Z
Link: CVE-2008-5230
Vulnrichment
No data.
NVD
Status : Modified
Published: 2008-11-25T23:30:00.593
Modified: 2024-11-21T00:53:36.773
Link: CVE-2008-5230
Redhat
No data.