The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.
References
Configurations
Information
Published : 2008-11-25 15:30
Updated : 2008-12-02 21:00
NVD link : CVE-2008-5230
Mitre link : CVE-2008-5230
JSON object : View
CWE
CWE-310
Cryptographic Issues
Products Affected
cisco
- ios