Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2008-5230
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
WPA加密标准TKIP密钥破解漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WPA加密即Wi-Fi Protected Access,是无线网络广泛使用的加密标准。 很多对Wi-Fi网络使用WPA和WPA2加密的产品没有安全地实现临时密钥完整性协议(TKIP),如果远程攻击者发送了特制的回放报文的话,就可能较容易的破解从AP发送给客户端的报文,然后执行ARP欺骗或其他攻击。 请注意这种攻击不是密钥恢复攻击,攻击者仅可以恢复用于认证报文的密钥而不是用于加密和混淆数据的密钥,且仅可以通过恢复的密钥伪造抓包到的报文,最多有7次尝试的窗口机会。每次攻击只能解密一个报文,所耗费的时间大约为
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2008-5230
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2008-5230
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2008-5230

No comments yet


Leave a comment