The function DecWPA2KeyData() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an rtl_memcpy() operation, resulting in a stack buffer overflow which can be exploited for remote code execution or denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker needs to know the network's PSK in order to exploit this.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-18489 The function DecWPA2KeyData() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an rtl_memcpy() operation, resulting in a stack buffer overflow which can be exploited for remote code execution or denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker needs to know the network's PSK in order to exploit this.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: VDOO

Published:

Updated: 2024-08-04T15:49:05.936Z

Reserved: 2020-09-23T00:00:00

Link: CVE-2020-25856

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-03T17:15:15.420

Modified: 2024-11-21T05:18:54.840

Link: CVE-2020-25856

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.