CVE-2020-26144

Name
CVE-2020-26144
Description
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://www.fragattacks.com
MISC https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
MLIST http://www.openwall.com/lists/oss-security/2021/05/11/12
CONFIRM https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
CISCO https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
MISC https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63

Match rules

CPE URI Source package Min version Max version

Vulnerable and fixed packages

Source package Branch Version Maintainer Status