The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2689-1 linux security update
Debian DLA Debian DLA DLA-2690-1 linux-4.19 security update
Debian DLA Debian DLA DLA-3380-1 firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)
EUVD EUVD EUVD-2020-17305 The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
Ubuntu USN Ubuntu USN USN-4997-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4997-2 Linux kernel (KVM) vulnerabilities
Ubuntu USN Ubuntu USN USN-4999-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5000-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5000-2 Linux kernel (KVM) vulnerabilities
Ubuntu USN Ubuntu USN USN-5001-1 Linux kernel (OEM) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00943}

epss

{'score': 0.00848}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:19:08.467Z

Reserved: 2020-08-21T00:00:00

Link: CVE-2020-24588

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-11T20:15:08.613

Modified: 2024-11-21T05:15:05.740

Link: CVE-2020-24588

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-05-12T00:00:00Z

Links: CVE-2020-24588 - Bugzilla

cve-icon OpenCVE Enrichment

No data.