Description
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-18771 | An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. |
References
History
Tue, 14 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Subscriptions
Arista
Subscribe
C-100
Subscribe
C-100 Firmware
Subscribe
C-110
Subscribe
C-110 Firmware
Subscribe
C-120
Subscribe
C-120 Firmware
Subscribe
C-130
Subscribe
C-130 Firmware
Subscribe
C-200
Subscribe
C-200 Firmware
Subscribe
C-230
Subscribe
C-230 Firmware
Subscribe
C-235
Subscribe
C-235 Firmware
Subscribe
C-250
Subscribe
C-250 Firmware
Subscribe
C-260
Subscribe
C-260 Firmware
Subscribe
C-65
Subscribe
C-65 Firmware
Subscribe
C-75
Subscribe
C-75 Firmware
Subscribe
O-105
Subscribe
O-105 Firmware
Subscribe
O-90
Subscribe
O-90 Firmware
Subscribe
W-118
Subscribe
W-118 Firmware
Subscribe
W-68
Subscribe
W-68 Firmware
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Samsung
Subscribe
Galaxy I9305
Subscribe
Galaxy I9305 Firmware
Subscribe
Siemens
Subscribe
Scalance W700 Ieee 802.11ax
Subscribe
Scalance W700 Ieee 802.11ax Firmware
Subscribe
Scalance W700 Ieee 802.11n
Subscribe
Scalance W700 Ieee 802.11n Firmware
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-14T08:49:08.532Z
Reserved: 2020-09-29T00:00:00.000Z
Link: CVE-2020-26144
No data.
Status : Modified
Published: 2021-05-11T20:15:08.837
Modified: 2026-04-14T09:16:25.173
Link: CVE-2020-26144
OpenCVE Enrichment
No data.
EUVD