<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Key Reinstallation Attacks: Cryptographic/protocol attack against WPA2</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-17-196</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2017-10-16T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2017-10-16T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2017-10-16T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            Several vulnerabilities affect the Wi-Fi Protected Access II (WPA2) protocol, potentially enabling Man-in-the-Middle (MitM) attacks between Wifi Clients and Access Points running WPA2 . The impact includes decryption, packet replay, TCP connection hijacking and HTTP content injection.The related CVEs are:CVE-2017-13077: reinstallation of the pairwise key in the 4-way handshakeCVE-2017-13078: reinstallation of the group key in the 4-way handshakeCVE-2017-13079: reinstallation of the integrity group key in the 4-way handshakeCVE-2017-13080: reinstallation of the group key in the group key handshakeCVE-2017-13081: reinstallation of the integrity group key in the group key handshakeCVE-2017-13082: accepting a retransmitted FT Reassociation Request and reinstalling the pairwise key while processing itCVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake.CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake.CVE-2017-13087: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame.CVE-2017-13088: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Execute unauthorized code or commands
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiGate:Those issues may only affect FortiGate Wifi models used under Wifi Client mode. Specifically:* FortiGates are not affected by CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087 and CVE-2017-13088* All other CVEs (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081) affect FortiGates running the following versions:** Branch 5.6: FortiOS 5.6.2 and below** Branch 5.4: FortiOS 5.4.5 and below** Branch 5.2: FortiOS 5.2.11 and below** Previous branches: All versionsFortiAP:Those issues may only affect FortiAP working as a mesh leaf. Specifically:* FortiAP is not affected by CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087 and CVE-2017-13088* All other CVEs (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081) affect FortiAP running the following firmware versions:** Branch 5.6: FortiAP 5.6.0** Branch 5.4: FortiAP 5.4.3 and below** Branch 5.2: FortiAP 5.2.6 and below** Previous branches: All versionsMeru AP:Meru AP is affected when working in Mesh mode or when Service assurance module (SAM) is enabled or when 801.11r is enabled. Specifically:* Meru AP is not affected by CVE-2017-13081, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087 and CVE-2017-13088* Meru AP is affected by CVE-2017-13082 when 802.11r is enabled and only with 11ac/wave2 APs. The affected versions are:** Branch 8.3: Meru AP 8.3.3 and below** Branch 8.2: Meru AP 8.2.7 and below** Branch 8.0: All versions* Meru AP is affected by CVE-2017-13077, CVE-2017-13078, CVE-2017-13079 and CVE-2017-13080 when under WPA2 security profile with the AP in client mode (under Mesh mode or when SAM enabled). The affected versions are:** Branch 8.3: Meru AP 8.3.3 and below** Branch 8.2: Meru AP 8.2.7 and below** Branch 8.0: All versions** Branch 7.0: Meru AP 7.0.11 and below** Previous branches: All versionsFortiWLC:FortiWLC is affected when working in Mesh mode or when Service assurance module (SAM) is enabled or when 801.11r is enabled. Specifically:* FortiWLC is not affected by CVE-2017-13081, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087 and CVE-2017-13088* FortiWLC is affected by CVE-2017-13082 when 802.11r is enabled and only with 11ac/wave2 APs. The affected versions are:** Branch 8.3: FortiWLC 8.3.3 and below** Branch 8.2: FortiWLC 8.2.7 and below** Branch 8.0: All versions* FortiWLC is affected by CVE-2017-13077, CVE-2017-13078, CVE-2017-13079 and CVE-2017-13080 when under WPA2 security profile with the AP in client mode (under Mesh mode or when SAM enabled). The affected versions are:** Branch 8.3: FortiWLC 8.3.3 and below** Branch 8.2: FortiWLC 8.2.7 and below** Branch 8.0: All versions** Branch 7.0: FortiWLC 7.0.11 and below** Previous branches: All versions
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            For FortiGate Wifi models used under Wifi Client mode:Upgrade to 5.2.12, 5.4.6 or 5.6.3 [**]For FortiAP used as a mesh leaf:Upgrade to FortiAP 5.2.7, 5.4.4 or 5.6.1 [**]For Meru AP:Apply special patches[*] to already released 8.3.3, 8.2.7 or 7.0.11For FortiWLC:Apply special patches[*] to already released 8.3.3, 8.2.7 or 7.0.11[] Reach out to your local TAC to request the special build and patches[*] for the additional CVE-2017-13077 fix, refer to the UPDATE belowUPDATE: Accumulate fix for CVE-2017-13077:To pass Wi-Fi Alliance Security Detection 2017 Test Plan Version 1.1, test case 4.1.5, the following product need to be specially upgraded to the following versions:FortiOS 5.2 branch: upgrade to upcoming 5.2.14FortiOS 5.4 branch: upgrade to FortiOS 5.4.9FortiAP 5.6 branch: upgrade to FortiAP 5.6.2UPDATE: AP side patch to prevent WPA2 KRACK attacks against vulnerable Wifi clients:Fortinet is providing Access Point side protection to prevent WPA2 KRACK attacks against vulnerable Wifi Clients (regardless their brand or make), with the following released or upcoming product and versions:FortiOS: From upcoming FortiOS 6.0.0FortiAP: From FortiAP 5.6.2 and 5.4.4Meru AP: From upcoming Meru AP 8.5.0FortiWLC: From upcoming FortiWLC 8.4.0When connected to the products and versions above, even third party Wifi Clients that are theoretically vulnerable to WPA2 KRACK attacks will actually become &#34;not impacted&#34;, due to the protection provided by the Access Point.Update History:10-16-2017 Initial version01-19-2018 Update accumulate fix info for CVE-2017-1307701-19-2018 AP side patch to prevent WPA2 KRACK attacks against vulnerable Wifi clients
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-17-196</cvrf:URL>
            <cvrf:Description>Key Reinstallation Attacks: Cryptographic/protocol attack against WPA2</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://www.krackattacks.com/</cvrf:URL>
            <cvrf:Description>https://www.krackattacks.com/</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <Vulnerability Ordinal="1">
        <Title>Key Reinstallation Attacks: Cryptographic/protocol attack against WPA2</Title>
        <cvrf:CVE>CVE-2017-13077</cvrf:CVE>
        <cvrf:CVE>CVE-2017-13078</cvrf:CVE>
        <cvrf:CVE>CVE-2017-13079</cvrf:CVE>
        <cvrf:CVE>CVE-2017-13080</cvrf:CVE>
        <cvrf:CVE>CVE-2017-13081</cvrf:CVE>
        <cvrf:CVE>CVE-2017-13082</cvrf:CVE>
        <cvrf:CVE>CVE-2017-13084</cvrf:CVE>
        <cvrf:CVE>CVE-2017-13086</cvrf:CVE>
        <cvrf:CVE>CVE-2017-13087</cvrf:CVE>
        <cvrf:CVE>CVE-2017-13088</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>5.9</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-17-196</URL>
                <Description>Key Reinstallation Attacks: Cryptographic/protocol attack against WPA2</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://www.krackattacks.com/</URL>
                <Description>https://www.krackattacks.com/</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>