CVE-2019-15126

An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.
References
Link Resource
http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-wifi-en
http://www.huawei.com/en/psirt/security-notices/huawei-sn-20200228-01-kr00k-en
https://cert-portal.siemens.com/productcert/pdf/ssa-712518.pdf
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001
https://support.apple.com/kb/HT210721 Third Party Advisory
https://support.apple.com/kb/HT210722 Third Party Advisory
https://support.apple.com/kb/HT210788
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-05
https://www.mist.com/documentation/mist-security-advisory-kr00k-attack-faq/
https://www.synology.com/security/advisory/Synology_SA_20_03
http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-wifi-en
http://www.huawei.com/en/psirt/security-notices/huawei-sn-20200228-01-kr00k-en
https://cert-portal.siemens.com/productcert/pdf/ssa-712518.pdf
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001
https://support.apple.com/kb/HT210721 Third Party Advisory
https://support.apple.com/kb/HT210722 Third Party Advisory
https://support.apple.com/kb/HT210788
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-05
https://www.mist.com/documentation/mist-security-advisory-kr00k-attack-faq/
https://www.synology.com/security/advisory/Synology_SA_20_03
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:broadcom:bcm4389_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm4389:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:broadcom:bcm43012_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm43012:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:broadcom:bcm43013_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm43013:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:broadcom:bcm4375_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm4375:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:broadcom:bcm43752_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm43752:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:broadcom:bcm4356_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm4356:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:28

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html - () http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html -
References () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt - () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt -
References () http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-wifi-en - () http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-wifi-en -
References () http://www.huawei.com/en/psirt/security-notices/huawei-sn-20200228-01-kr00k-en - () http://www.huawei.com/en/psirt/security-notices/huawei-sn-20200228-01-kr00k-en -
References () https://cert-portal.siemens.com/productcert/pdf/ssa-712518.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-712518.pdf -
References () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001 - () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001 -
References () https://support.apple.com/kb/HT210721 - Third Party Advisory () https://support.apple.com/kb/HT210721 - Third Party Advisory
References () https://support.apple.com/kb/HT210722 - Third Party Advisory () https://support.apple.com/kb/HT210722 - Third Party Advisory
References () https://support.apple.com/kb/HT210788 - () https://support.apple.com/kb/HT210788 -
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure - () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure -
References () https://us-cert.cisa.gov/ics/advisories/icsa-20-224-05 - () https://us-cert.cisa.gov/ics/advisories/icsa-20-224-05 -
References () https://www.mist.com/documentation/mist-security-advisory-kr00k-attack-faq/ - () https://www.mist.com/documentation/mist-security-advisory-kr00k-attack-faq/ -
References () https://www.synology.com/security/advisory/Synology_SA_20_03 - () https://www.synology.com/security/advisory/Synology_SA_20_03 -

Information

Published : 2020-02-05 17:15

Updated : 2024-11-21 04:28


NVD link : CVE-2019-15126

Mitre link : CVE-2019-15126

CVE.ORG link : CVE-2019-15126


JSON object : View

Products Affected

apple

  • mac_os_x
  • iphone_os
  • ipados

broadcom

  • bcm43012
  • bcm43752_firmware
  • bcm4375
  • bcm4356_firmware
  • bcm43013_firmware
  • bcm43752
  • bcm4389_firmware
  • bcm43012_firmware
  • bcm4356
  • bcm4375_firmware
  • bcm4389
  • bcm43013
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition