The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.

Project Subscriptions

Vendors Products
C-200 Firmware Subscribe
C-230 Firmware Subscribe
C-235 Firmware Subscribe
C-250 Firmware Subscribe
C-260 Firmware Subscribe
Debian Linux Subscribe
Ieee 802.11 Subscribe
Ac 1550 Subscribe
Ac 1550 Firmware Subscribe
Ac 3165 Subscribe
Ac 3165 Firmware Subscribe
Ac 3168 Subscribe
Ac 3168 Firmware Subscribe
Ac 7265 Subscribe
Ac 7265 Firmware Subscribe
Ac 8260 Subscribe
Ac 8260 Firmware Subscribe
Ac 8265 Subscribe
Ac 8265 Firmware Subscribe
Ac 9260 Subscribe
Ac 9260 Firmware Subscribe
Ac 9461 Subscribe
Ac 9461 Firmware Subscribe
Ac 9462 Subscribe
Ac 9462 Firmware Subscribe
Ac 9560 Subscribe
Ac 9560 Firmware Subscribe
Ax1650 Firmware Subscribe
Ax1675 Firmware Subscribe
Ax200 Firmware Subscribe
Ax201 Firmware Subscribe
Ax210 Firmware Subscribe
Linux Kernel Subscribe
Mac80211 Subscribe
Enterprise Linux Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2689-1 linux security update
Debian DLA Debian DLA DLA-2690-1 linux-4.19 security update
Debian DLA Debian DLA DLA-3380-1 firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)
EUVD EUVD EUVD-2020-17303 The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
Ubuntu USN Ubuntu USN USN-4997-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4997-2 Linux kernel (KVM) vulnerabilities
Ubuntu USN Ubuntu USN USN-4999-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5000-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5000-2 Linux kernel (KVM) vulnerabilities
Ubuntu USN Ubuntu USN USN-5001-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-5018-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:19:08.804Z

Reserved: 2020-08-21T00:00:00

Link: CVE-2020-24586

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-11T20:15:08.537

Modified: 2024-11-21T05:15:03.803

Link: CVE-2020-24586

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-05-12T01:20:00Z

Links: CVE-2020-24586 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses