CVE-2019-15126
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/02/2020
Last modified:
11/08/2020
Description
An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.
Impact
Base Score 3.x
3.10
Severity 3.x
LOW
Base Score 2.0
2.90
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* | 13.2 (excluding) | |
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* | 13.2 (excluding) | |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | 10.15.1 (excluding) | |
cpe:2.3:o:broadcom:bcm4389_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:broadcom:bcm4389:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:broadcom:bcm43012_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:broadcom:bcm43012:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:broadcom:bcm43013_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:broadcom:bcm43013:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:broadcom:bcm4375_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:broadcom:bcm4375:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:broadcom:bcm43752_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:broadcom:bcm43752:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:broadcom:bcm4356_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:broadcom:bcm4356:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-wifi-en
- http://www.huawei.com/en/psirt/security-notices/huawei-sn-20200228-01-kr00k-en
- https://cert-portal.siemens.com/productcert/pdf/ssa-712518.pdf
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001
- https://support.apple.com/kb/HT210721
- https://support.apple.com/kb/HT210722
- https://support.apple.com/kb/HT210788
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure
- https://us-cert.cisa.gov/ics/advisories/icsa-20-224-05
- https://www.mist.com/documentation/mist-security-advisory-kr00k-attack-faq/
- https://www.synology.com/security/advisory/Synology_SA_20_03