National Vulnerability Database

National Vulnerability Database

National Vulnerability

CVE-2008-5230 Detail

Current Description

The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng.

Source:  MITRE
View Analysis Description


CVSS 3.x Severity and Metrics:

Base Score: N/A
NVD score not yet provided.

Evaluator Impact

The impact of this vulnerability has yet to be determined. The full list of affected platforms is subject to change. The NVD will continue to monitor this vulnerability and adjust the configurations as needed.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to

Hyperlink Resource Exploit Exploit

Weakness Enumeration

CWE-ID CWE Name Source
CWE-310 Cryptographic Issues NIST  

Known Affected Software Configurations Switch to CPE 2.2

Configuration 1 ( hide )
     Show Matching CPE(s)

Change History

1 change record found - show changes

Quick Info

CVE Dictionary Entry:
NVD Published Date:
NVD Last Modified: