CVE-2020-26146
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
11/05/2021
Last modified:
06/12/2021
Description
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
2.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:samsung:galaxy_i9305_firmware:4.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:h:samsung:galaxy_i9305:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-250_firmware:*:*:*:*:*:*:*:* | 10.0.1-31 (excluding) | |
| cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-260_firmware:*:*:*:*:*:*:*:* | 10.0.1-31 (excluding) | |
| cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:* | 10.0.1-31 (excluding) | |
| cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-235_firmware:*:*:*:*:*:*:*:* | 10.0.1-31 (excluding) | |
| cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-200_firmware:*:*:*:*:*:*:*:* | 11.0.0-36 (excluding) | |
| cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-120_firmware:*:*:*:*:*:*:*:* | 11.0.0-36 (excluding) | |
| cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arista:c-130_firmware:*:*:*:*:*:*:*:* | 11.0.0-36 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2021/05/11/12
- https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.fragattacks.com



