CVE-2020-24588

Name
CVE-2020-24588
Description
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
NVD Severity
low
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://www.fragattacks.com
MISC https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
MLIST http://www.openwall.com/lists/oss-security/2021/05/11/12
Mailing List https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
Mailing List https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
CISCO https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
CONFIRM https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
MISC https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:* ieee_802.11 == None == None
cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:* mac80211 == None == -

Vulnerable and fixed packages

Source package Branch Version Maintainer Status