The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Arista
Subscribe
|
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Ieee
Subscribe
|
Ieee 802.11
Subscribe
|
|
Intel
Subscribe
|
Ac 1550
Subscribe
Ac 1550 Firmware
Subscribe
Ac 3165
Subscribe
Ac 3165 Firmware
Subscribe
Ac 3168
Subscribe
Ac 3168 Firmware
Subscribe
Ac 7265
Subscribe
Ac 7265 Firmware
Subscribe
Ac 8260
Subscribe
Ac 8260 Firmware
Subscribe
Ac 8265
Subscribe
Ac 8265 Firmware
Subscribe
Ac 9260
Subscribe
Ac 9260 Firmware
Subscribe
Ac 9461
Subscribe
Ac 9461 Firmware
Subscribe
Ac 9462
Subscribe
Ac 9462 Firmware
Subscribe
Ac 9560
Subscribe
Ac 9560 Firmware
Subscribe
Ax1650
Subscribe
Ax1650 Firmware
Subscribe
Ax1675
Subscribe
Ax1675 Firmware
Subscribe
Ax200
Subscribe
Ax200 Firmware
Subscribe
Ax201
Subscribe
Ax201 Firmware
Subscribe
Ax210
Subscribe
Ax210 Firmware
Subscribe
|
|
Linux
Subscribe
|
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2689-1 | linux security update |
Debian DLA |
DLA-2690-1 | linux-4.19 security update |
Debian DLA |
DLA-3380-1 | firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10) |
EUVD |
EUVD-2020-17303 | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data. |
Ubuntu USN |
USN-4997-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4997-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-4999-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5000-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5000-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-5001-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5018-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:19:08.804Z
Reserved: 2020-08-21T00:00:00
Link: CVE-2020-24586
No data.
Status : Modified
Published: 2021-05-11T20:15:08.537
Modified: 2024-11-21T05:15:03.803
Link: CVE-2020-24586
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN