CVE-2020-24586
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/05/2021
Last modified:
01/04/2023
Description
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
Impact
Base Score 3.x
3.50
Severity 3.x
LOW
Base Score 2.0
2.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-250_firmware:*:*:*:*:*:*:*:* | 10.0.1-31 (excluding) | |
| cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-260_firmware:*:*:*:*:*:*:*:* | 10.0.1-31 (excluding) | |
| cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:* | 10.0.1-31 (excluding) | |
| cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-235_firmware:*:*:*:*:*:*:*:* | 10.0.1-31 (excluding) | |
| cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-200_firmware:*:*:*:*:*:*:*:* | 11.0.0-36 (excluding) | |
| cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:* | 22.30.0.11 (excluding) | |
| cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2021/05/11/12
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.fragattacks.com
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html



