The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00943}

epss

{'score': 0.00848}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:19:08.467Z

Reserved: 2020-08-21T00:00:00

Link: CVE-2020-24588

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-11T20:15:08.613

Modified: 2024-11-21T05:15:05.740

Link: CVE-2020-24588

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-05-12T00:00:00Z

Links: CVE-2020-24588 - Bugzilla

cve-icon OpenCVE Enrichment

No data.