Vulnerability Details : CVE-2008-5230
The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.
Exploit prediction scoring system (EPSS) score for CVE-2008-5230
Probability of exploitation activity in the next 30 days: 0.86%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-5230
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2008-5230
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-5230
-
http://www.aircrack-ng.org/doku.php?id=tkiptun-ng
-
http://www.cisco.com/en/US/products/products_security_response09186a0080a30036.html
-
http://arstechnica.com/articles/paedia/wpa-cracked.ars
-
http://radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html
-
http://trac.aircrack-ng.org/svn/trunk/src/tkiptun-ng.c
Exploit
-
http://dl.aircrack-ng.org/breakingwepandwpa.pdf
Exploit
-
http://www.securityfocus.com/bid/32164
-
http://lists.immunitysec.com/pipermail/dailydave/2008-November/005413.html
Products affected by CVE-2008-5230
- cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*