CVE-2020-26139
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
11/05/2021
Last modified:
30/09/2022
Description
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
2.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:netbsd:netbsd:7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2021/05/11/12
- https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.fragattacks.com



