Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   OS (UNIX)  >   OpenBSD Kernel Vendors:   OpenBSD
OpenBSD Wifi WPA1/WPA2 Protocol Implementation Flaw Lets Remote Users Access and Modify Wifi Sessio Data
SecurityTracker Alert ID:  1037948
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 2 2017
Impact:   Disclosure of user information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.9, 6.0
Description:   A vulnerability was reported in OpenBSD. A remote user can conduct a man-in-the-middle attack to access Wifi session data.

A remote user that can conduct a man-in-the-middle attack against the target OpenBSD wifi client using WPA1 or WPA2 can exploit a protocol implementation flaw and cause the target client to send and receive unencrypted frames.

OpenBSD clients are affected. OpenBSD access points are not affected affected.

Mathy Vanhoef reported this vulnerability.

Impact:   A remote user that can conduct a man-in-the-middle attack against the WPA1/WPA2 Wifi connection can access and modify data Wifi session data.
Solution:   The vendor has issued a source code fix, available at:

The vendor advisories are available at:

Vendor URL: (Links to External Site)
Cause:   State error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC