[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":106,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":113,"vulnerability-7805":119,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":150},[4,15,22,29,36,43,50,57,62,69,74,80,85,90,96],{"title":5,"slug":6,"text":7,"link":8,"external":9,"targets":10,"cta":12,"variant":13,"campaign_id":14},"Compliance - Advanced Pentest Reporting","compliance-advanced-pentest-reporting","Prove your compliance. Get built-in validation with audit-ready reports.","https://pentest-tools.com/pricing",false,[11],"/features/advanced-pentest-reporting","Unlock audit-ready reports","primary",null,{"title":16,"slug":17,"text":18,"link":8,"external":9,"targets":19,"cta":21,"variant":13,"campaign_id":14},"Compliance - Integrations","compliance-integrations","Disconnected tools hide compliance breaches. Stay audit-ready 24/7 with the right integrations.",[20],"/features/integrations","Automate your compliance",{"title":23,"slug":24,"text":25,"link":8,"external":9,"targets":26,"cta":28,"variant":13,"campaign_id":14},"Compliance - ML Classifier","compliance-ml-classifier","Put compliance on Auto this year with 50% fewer FPs. Go deeper with the WebNetSec plan.",[27],"/features/machine-learning-classifier","Explore WebNetSec",{"title":30,"slug":31,"text":32,"link":8,"external":9,"targets":33,"cta":35,"variant":13,"campaign_id":14},"Compliance - Pentest Robots","compliance-pentest-robots","Put compliance on Auto with Pentest Robots. Available with any plan.",[34],"/features/pentest-robots","Automate continuous scans",{"title":37,"slug":38,"text":39,"link":8,"external":9,"targets":40,"cta":42,"variant":13,"campaign_id":14},"Compliance - Sniper: Auto-Exploiter","compliance-sniper-auto-exploiter","Get audit-ready proof and put compliance on Auto with our proprietary Sniper: Auto-exploiter. Available with Pentest Suite.",[41],"/exploit-helpers/sniper","Get proof with Pentest Suite",{"title":44,"slug":45,"text":46,"link":8,"external":9,"targets":47,"cta":49,"variant":13,"campaign_id":14},"Compliance - Network Scanner","compliance-network-scanner","Map your attack surface and prove infrastructure compliance with the Network Scanner. Available with any plan.",[48],"/network-vulnerability-scanning/network-security-scanner-online","Upgrade your plan",{"title":51,"slug":52,"text":53,"link":8,"external":9,"targets":54,"cta":56,"variant":13,"campaign_id":14},"Compliance - Website Scanner","compliance-website-scanner","Prove real risk instantly and put compliance on Auto with the Website Scanner. Available with the WebNetSec plan.",[55],"/website-vulnerability-scanning/website-scanner","Unlock AppSec compliance",{"title":58,"slug":59,"text":60,"link":8,"external":9,"targets":61,"cta":12,"variant":13,"campaign_id":14},"Compliance - Advanced Pentest Reporting (A-B test)","compliance-advanced-pentest-reporting-1","Stop piecing together reports manually. Upgrade today to unlock instant proof for audits.",[11],{"title":63,"slug":64,"text":65,"link":8,"external":9,"targets":66,"cta":67,"variant":68,"campaign_id":14},"Compliance - Integrations (A-B test)","compliance-integrations-1","Disconnected tools will fail your next audit. Unlock the integrations needed for compliance.",[20],"Connect your stack","secondary",{"title":70,"slug":71,"text":72,"link":8,"external":9,"targets":73,"cta":28,"variant":13,"campaign_id":14},"Compliance - ML Classifier (A-B test)","compliance-ml-classifier-1","Ghost vulnerabilities drain time and chip your compliance. Upgrade to WebNetSec to stay audit-ready with 50% fewer FPs.",[27],{"title":75,"slug":76,"text":77,"link":8,"external":9,"targets":78,"cta":79,"variant":13,"campaign_id":14},"Compliance - Network Scanner (A-B test)","compliance-network-scanner-1","Unmapped assets are compliance landmines - upgrade your plan with complete attack surface visibility.",[48],"Get deep network scans",{"title":81,"slug":82,"text":83,"link":8,"external":9,"targets":84,"cta":35,"variant":13,"campaign_id":14},"Compliance - Pentest Robots (A-B test)","compliance-pentest-robots-1","Don’t leave compliance to chance - deploy Pentest Robots to quickly automate your audit readiness.",[34],{"title":86,"slug":87,"text":88,"link":8,"external":9,"targets":89,"cta":42,"variant":13,"campaign_id":14},"Compliance - Sniper: Auto-Exploiter (A-B test)","compliance-sniper-auto-exploiter-1","Deliver audit-ready proof instantly and stay compliant 24/7/365 - only with Sniper: Auto-Exploiter. Available with Pentest Suite.",[41],{"title":91,"slug":92,"text":93,"link":8,"external":9,"targets":94,"cta":95,"variant":13,"campaign_id":14},"Compliance - Website Scanner (A-B test)","compliance-website-scanner-1","Web vulnerabilities let in devastating compliance fines. Stay audit-ready with deep, proprietary scans. Available with the WebNetSec plan.",[55],"Upgrade to WebNetSec",{"title":97,"slug":98,"text":99,"link":100,"external":101,"targets":102,"cta":104,"variant":13,"campaign_id":105},"Office hours #2 - session 1","office-hours-2-session-1","Got 45 minutes on Wednesday? We're going live with Office Hours!","https://zoom.us/webinar/register/4517773011637/WN_uMAjbUwRSqCj1knLCcOCTg",true,[103],"/","Save your seat","office-hours-2",["Island",107],{"key":108,"params":109,"result":111},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":110},"{}",{"head":112},{},["Island",114],{"key":115,"params":116,"result":117},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":110},{"head":118},{},{"id":120,"detectable_with":121,"vuln_details":128,"vuln_id":147,"name":148,"published":149,"updated":14},7805,{"tool":122,"engine":125},{"id":123,"name":124},1,"Network Scanner",{"id":126,"name":127},3,"OpenVAS",{"id":120,"codename":14,"description":14,"severity":129,"risk_description":130,"public_description":131,"public_recommendation":132,"recommendation":14,"references":133,"cvssv3":135,"epss_score":136,"epss_percentile":137,"cve":138,"in_cisa_catalog":9,"date":14,"software_type":14,"vendor":14,"product":14,"ptt_exploit_capabilities":14},"medium","On October 16th, 2017, a research paper with the title of Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 was made publicly available. This paper discusses seven vulnerabilities affecting session key negotiation in both the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key, or an integrity key on either a wireless client or a wireless access point. Additional research also led to the discovery of three additional vulnerabilities (not discussed in the original paper) affecting wireless supplicant supporting either the 802.11z (Extensions to Direct-Link Setup) standard or the 802.11v (Wireless Network Management) standard. The three additional vulnerabilities could also allow the reinstallation of a pairwise key, group key, or integrity group key. An attacker within the wireless communications range of an affected AP and client may leverage packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast, broadcast, and multicast frames.","Cisco IP Phone 8861 is prone to key reinstallation attacks against WPA protocol.","Update to version 12.0.1SR1 or later.",[134],"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa",5.3,0.0111,0.78218,[139,140,141,142,143,144,145,146],"CVE-2017-13077","CVE-2017-13078","CVE-2017-13079","CVE-2017-13080","CVE-2017-13081","CVE-2017-13086","CVE-2017-13087","CVE-2017-13088","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.140451","Cisco IP Phone 8861 Multiple WPA2 Vulnerabilities","2018-01-02T00:00:00Z",["Island",151],{"key":152,"params":153,"result":155},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":154},"{\"text-color\":\"gray\"}",{"head":156},{}]