Researchers Mathy Vanhoef and Frank Piessens from the University of Leuven uncovered security vulnerabilities in key negotiations on both the Wi-Fi Protected Access (WPA) and Wi-Fi
Protected Access II (WPA2) protocols. An attacker within range of an affected wireless access point (AP) and client may leverage these vulnerabilities to conduct attacks using susceptible data confidentiality protocols. These vulnerabilities could allow for reinstallation of the Group Temporal Key (GTK) during the group key handshake, which could allow an attacker within radio range to replay frames from access points to clients.
Impact Scope:
Wi-Fi clients using WPA or WPA2 security are affected. This means any computer with wireless may be impacted.
For additional information, please refer to the Microsoft® and Intel® websites below.
Microsoft Security TechCenter
CVE-2017-13080 | Windows Wireless WPA Group Key Reinstallation Vulnerability
Intel security Center
One or more Intel Products affected by the Wi-Fi Protected Access II (WPA2) protocol vulnerability
Resolution:
- Check below to see if your system has been impacted.
- Download and install the latest updates.
Note: If your model does not currently have a link for an updated firmware or driver, please check back at a later time.
Affected Models
Desktop
Notebook
Model Name | WiFi Driver Version | ME Firmware Version |
S1002 | Realtek 3008.66.1013.2017 | N/A |
S1002P | Realtek 3008.66.1013.2017 | N/A |
SW1-011 | Realtek 3008.66.1013.2017 | N/A |
SW3-013 | Broadcom 5.93.102.19
Realtek 3008.66.1013.2017 | N/A |
SW3-013P | Broadcom 5.93.102.19
Realtek 3008.66.1013.2017 | N/A |
SW3-016 | Realtek 3008.66.1013.2017
Broadcom 5.93.103.23 | N/A |
SW3-016P | Realtek 3008.66.1013.2017
Broadcom 5.93.103.23 | N/A |
SW5-014 | Broadcom 5.93.102.23 | N/A |
SW5-014P | Broadcom 5.93.102.23 | N/A |
TravelMate P449-G2-M | Intel_20.10.1.3 | 11.8.50.3425 |
TravelMate P449-G2-MG | Intel 20.10.1.3 | 11.8.50.3425 |
TravelMate P449-M | Intel 20.10.1.3 | 11.8.50.3425 |
TravelMate P449-MG | Intel 20.10.1.3 | 11.8.50.3425 |
TravelMate P459-G2-M | Intel 20.10.1.3 | 11.8.50.3425 |
TravelMate P459-G2-MG | Intel 20.10.1.3 | 11.8.50.3425 |
TravelMate P459-M | Intel 20.10.1.3 | 11.8.50.3425 |
TravelMate P459-MG | Intel 20.10.1.3 | 11.8.50.3425 |
TravelMate P643-M | N/A | 8.1.72.3002 |
TravelMate P643-MG | N/A | 8.1.72.3002 |
TravelMate P643-V | N/A | 8.1.72.3002 |
TravelMate P645-S | Atheros_12.0.0.448 | N/A |
TravelMate P645-SG | Atheros_12.0.0.448 | N/A |
TravelMate P648-G2-M | Intel_20.10.2.2 | 11.8.50.3425
|
TravelMate P648-G3-M | Intel_20.10.2.2 | 11.8.50.3425
|
TravelMate P648-M | Intel_20.10.2.2 | 11.8.50.3425
|
TravelMate P648-MG | Intel_20.10.2.2 | 11.8.50.3425
|
TravelMate P653-M | N/A | 8.1.72.3002 |
TravelMate P653-MG | N/A | 8.1.72.3002 |
TravelMate P653-V | N/A | 8.1.72.3002 |
TravelMate P658-G2-M | Intel_20.10.2.2 | 11.8.50.3425
|
TravelMate P658-G2-MG | Intel_20.10.2.2 | 11.8.50.3425
|
TravelMate P658-G3-M | Intel_20.10.2.2 | 11.8.50.3425
|
TravelMate P658-M | Intel_20.10.2.2 | 11.8.50.3425
|
TravelMate P658-MG | Intel_20.10.2.2 | 11.8.50.3425
|
Tablet
Model Name | OS SKU |
B1-860/B1-860A | WW_GEN1 |
B3- | WW_GEN1 |
B3-A40FHD | WW_GEN1 |
B1-7A0 | WW_GEN1 |
A3-A50 | WW_GEN1 |
|
Smartphone
Model Name | OS SKU |
ZEST4G (T01) | Acer_AV0M0_T07_1.021.00_WW_GEN1
Acer_AV0M0_T07_1.016.00_WW_GEN1s
EMEA_BGCS
EMEA_VIPS
EMEA_VIPSRS
|
ZEST (T06) | WW_GEN1
WW_GEN1S
|
ZEST_PLUS (T08) | WW_GEN1
EMEA_BGCS
WW_GEN1S
PA_GEN1
PA_GEN1S
TWN_GEN1
LA_TIGOBOS
EMEA_BHT
|
Z6_PLUS (T11) | WW_GEN1
EMEA_BHT
|
Z60 (T09) | EMEA_GEN1
EMEA_BGCS
|
Z6E (T10) | EMEA_GEN1 |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
Disclaimer:
THE ABOVE INFORMATION IS PROVIDED "AS IS" IN CONNECTION WITH ACER AND INTEL® PRODUCTS. YOUR USE OF THE INFORMATION OR MATERIALS LINKED FROM THIS PAGE IS AT YOUR OWN RISK. ACER RESERVES THE RIGHT TO CHANGE OR UPDATE THIS PAGE AT ANY TIME.
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00101&languageid=en-fr