{"id": "CVE-2020-24586", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 5.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 3.5, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 2.1}]}, "published": "2021-05-11T20:15:08.537", "references": [{"url": "http://www.openwall.com/lists/oss-security/2021/05/11/12", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", "source": "cve@mitre.org"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.fragattacks.com", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data."}, {"lang": "es", "value": "El est\u00e1ndar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que los fragmentos recibidos se borren de la memoria despu\u00e9s de (re)conectarse a una red. En las circunstancias adecuadas, cuando otro dispositivo env\u00eda tramas fragmentadas cifradas mediante WEP, CCMP o GCMP, se puede abusar de esto para inyectar paquetes de red arbitrarios y/o exfiltrar datos del usuario"}], "lastModified": "2023-04-01T22:15:07.357", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:arista:c-250_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B22D5837-A2CC-41AB-8252-1724345AEDC5", "versionEndExcluding": "10.0.1-31"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:arista:c-260_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4180BE58-3CA0-4FFD-B5BE-44E36FDE5F89", "versionEndExcluding": "10.0.1-31"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59BE4F3A-477A-4DE9-B293-F2AF2CCED9A3", "versionEndExcluding": "10.0.1-31"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:arista:c-235_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96A0A5F0-B046-4B53-92BC-D21705B1597C", "versionEndExcluding": "10.0.1-31"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:arista:c-200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C62FEC63-9790-44DF-8AA0-050E89E883B1", "versionEndExcluding": "11.0.0-36"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C073E29-FABA-4A07-A833-0E0A2CA5C9F4", "versionEndExcluding": "22.30.0.11"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F226D74C-4A48-4AC0-A565-A00D555E27D6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A5420D2-2979-4BA7-8BF5-2F522CCE3C74", "versionEndExcluding": "22.30.0.11"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4649D446-130B-4B31-B9ED-BA7F9F7EEB8F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EC9FE51-D078-41C0-80DB-21820AD151C2", "versionEndExcluding": "22.30.0.11"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E9903E2E-A670-40D4-8B9F-D2C0CFDBFC9F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D239D907-FE04-4E02-B4BF-7F0A24CCC781", "versionEndExcluding": "22.30.0.11"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDD21C53-CCBA-43FD-9DF7-A087705EC26E", "versionEndExcluding": "22.30.0.11"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6E89EB0D-233A-486A-BDAE-F5726432CD7E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19F30CC4-1D90-4298-BE72-307F8CD9C8E4", "versionEndExcluding": "22.30.0.11"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A11E55E8-5FA9-4ED7-AB61-03F22EE1759B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8D25023-2C51-4186-BEE6-0C1096181C7C", "versionEndExcluding": "22.30.0.11"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1091737E-15B8-4F29-AFC7-DAB19B4736DB", "versionEndExcluding": "20.70.21.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33EF2DC9-CD1E-43C1-88AF-9E83E2E4EC81", "versionEndExcluding": "20.70.21.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F779EAF-1408-4994-9701-CE24AC5FB8A9", "versionEndExcluding": "19.51.33.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ED5B2BCE-2D8A-440C-B866-76E035314022"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE6B04BC-69A8-469C-8364-F8CA6F5B09D2", "versionEndExcluding": "19.51.33.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ac_7265:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8F9F1CE7-8F14-4526-A857-7B954EC4BB6F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42A7C347-86AF-4397-B227-C636D352CB87", "versionEndExcluding": "19.51.33.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "197A3DA1-B8EF-438F-B933-32253C43C8EE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ax1675_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DAB2B67-5C39-4438-8E36-3F740A697599"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ax1675:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3F407ACA-0952-4717-A302-2D5CEB6DB111"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ax1650_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B39FB813-1EC0-4B5C-B8CB-F5129DBF94C2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E8B944F7-4A5F-41D0-A910-6F978F66CAA0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:ac_1550_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A66D96C8-7C0D-4615-B825-A15DBB37B920"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intel:ac_1550:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "12419474-DB56-462D-9116-3614A4BBAF20"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2C083CF-3D4D-4AF0-8461-835F6AC264CC", "versionEndExcluding": "4.4.271", "versionStartIncluding": "4.4"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11580478-2F79-45B8-9BC0-FEF28259A4F5", "versionEndExcluding": "4.9.271", "versionStartIncluding": "4.9"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "970E3D3C-8829-4599-95A7-AC63136CE48E", "versionEndExcluding": "4.14.235", "versionStartIncluding": "4.14"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", "versionEndExcluding": "4.19.193", "versionStartIncluding": "4.19"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", "versionEndExcluding": "5.4.124", "versionStartIncluding": "5.4"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", "versionEndExcluding": "5.10.42", "versionStartIncluding": "5.10"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", "versionEndExcluding": "5.12.9", "versionStartIncluding": "5.12"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}