CVE-2017-13080

ENISA EUVD: EUVD-2017-4598 ↗
✓ Confirmed 0-Day
Triaged: March 5, 2026 4 articles Published: 2017-10-17

EPSS Score

Source: FIRST.org · 2026-05-23
0.82%
probability
This CVE has a 0.82% probability of being exploited in the next 30 days.
0% Top 74.6th percentile of all CVEs 100%

CVSS v3.0

Source: NVD
5.3
MEDIUM
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS v2 (legacy)

2.9
LOW
Access Vector
Adjacent Network
Access Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
AV:A/AC:M/Au:N/C:N/I:P/A:N

Description

VulnerabilityLookup (CNA)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

Affected Products

Wi-Fi Alliance
Wi-Fi Protected Access (WPA and WPA2)
WPA WPA2

Attack Intelligence

Signal Intelligence

Confidence
95%
EPSS 0.82%
CVSS v3.0 5.3
Mentions 4
Last Seen Nov 14, 2017

CNA Information

CNA Assigner
certcc

Analyst Note

CVE-2017-13080 is part of the KRACK (Key Reinstallation Attacks) vulnerability disclosure, which was actively exploited in the wild and publicly disclosed on October 16-17, 2017. Exploitation occurred simultaneously with public disclosure, and patches were being released concurrently by major vendors (Apple, Microsoft, Linux, etc.), meeting the zero-day criteria of in-the-wild exploitation preceding or coinciding with patch availability.

Triage Info

Decided atMar 05, 2026
Published DateOct 17, 2017