BDU:2021-03088

Vulnerability from fstec - Published: 10.05.2021
VLAI Severity ?
Title
Уязвимость реализации алгоритмов WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Description
Уязвимость реализации алгоритмов WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11 связана с недостаточной стойкостью шифрования. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, оказать воздействие на целостность защищаемой информации
Vendor
Microsoft Corp, Red Hat Inc., Cisco Systems Inc., Samsung Electronics, АО «ИВК», АО "НППКТ", Сообщество свободного программного обеспечения
Software Name
Windows 7 Service Pack 1, Windows Server 2008 Service Pack 2, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1, Windows 10, Windows 10 1607, Windows Server 2016, Windows RT 8.1, Windows Server 2008 Service Pack 2 (Server Core Installation), Windows Server 2012 R2 (Server Core installation), Windows Server 2016 (Server Core installation), Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows 10 1803, Windows 10 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Red Hat Enterprise Linux, Windows 10 1909, Windows Server 1909 (Server Core Installation), Windows 10 2004, Windows Server 2004 (Server Core Installation), Windows 10 20H2, Windows Server 20H2 (Server Core Installation), Cisco IP Conference Phone 8832, Cisco IP Phone 6861 with Multiplatform, Cisco IP Phone 8861, Cisco IP Phone 8865, Cisco IP Phone 8861 Running Third-Party Call Control (3PCC) Software, Cisco IP Phone 8821, Webex Room, Webex Desk, Webex Board, Webex Wireless Phone 860, Webex Wireless Phone 840, Cisco Aironet 1560, Cisco Aironet 2800, Cisco Aironet 3800, Cisco Aironet 4800, Catalyst IW 6300, Aironet 1542, Aironet 1810, Aironet 1815, Aironet 1832, Aironet 1842, Aironet 1852, Aironet 1800i, Catalyst 9117, Catalyst 9124, Catalyst 9130, Aironet 1552, Aironet 1552H, Aironet 1572, Aironet 1702, Aironet 2702, Aironet 3702, IW 3702, Catalyst 9115 Wi-Fi 6, Catalyst 9120, Integrated AP on 1100 Integrated Services Routers, Samsung Galaxy S3, Альт 8 СП (запись в едином реестре российских программ №4305), ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913), Linux, Windows Server 2012 (Server Core installation)
Software Version
- (Windows 7 Service Pack 1), - (Windows Server 2008 Service Pack 2), - (Windows 8.1), - (Windows Server 2012), - (Windows Server 2012 R2), - (Windows Server 2008 R2 Service Pack 1), - (Windows 10), - (Windows 10 1607), - (Windows Server 2016), - (Windows RT 8.1), - (Windows Server 2008 Service Pack 2 (Server Core Installation)), - (Windows Server 2012 R2 (Server Core installation)), - (Windows Server 2016 (Server Core installation)), - (Windows Server 2008 R2 Service Pack 1 (Server Core installation)), - (Windows 10 1803), - (Windows 10 1809), - (Windows Server 2019), - (Windows Server 2019 (Server Core installation)), 8 (Red Hat Enterprise Linux), - (Windows 10 1909), - (Windows Server 1909 (Server Core Installation)), - (Windows 10 2004), - (Windows Server 2004 (Server Core Installation)), - (Windows 10 20H2), - (Windows Server 20H2 (Server Core Installation)), 12.8(1)SR1 (Cisco IP Conference Phone 8832), 11.3(3) (Cisco IP Phone 6861 with Multiplatform), 12.8(1)SR1 (Cisco IP Phone 8861), 12.8(1)SR1 (Cisco IP Phone 8865), 11.3(4) (Cisco IP Phone 8861 Running Third-Party Call Control (3PCC) Software), 11.0(6)SR1 (Cisco IP Phone 8821), 9.15.2-RoomOS_March_2021 (Webex Room), 10.2.1-RoomOS_March_2021 (Webex Room), 9.15.0.11 (Webex Desk), 10.3.1-RoomOS_April_2021 (Webex Board), 1.1(0) (Webex Wireless Phone 860), 1.1(0) (Webex Wireless Phone 840), ap-17.3.4.15 (Cisco Aironet 1560), ap-17.3.4.15 (Cisco Aironet 2800), ap-17.3.4.15 (Cisco Aironet 3800), ap-17.3.4.15 (Cisco Aironet 4800), ap-17.3.4.15 (Catalyst IW 6300), ap-17.6.0.31 (Aironet 1542), ap-17.6.0.31 (Aironet 1810), ap-17.6.0.31 (Aironet 1815), ap-17.6.0.31 (Aironet 1832), ap-17.6.0.31 (Aironet 1842), ap-17.6.0.31 (Aironet 1852), ap-17.6.0.31 (Aironet 1800i), ap-17.6.0.31 (Catalyst 9117), ap-17.6.0.31 (Catalyst 9124), ap-17.6.0.31 (Catalyst 9130), 8.10(158.64) (Aironet 1552), ap-17.6.0.97 (Aironet 1552), 8.10(158.64) (Aironet 1552H), 8.10(158.64) (Aironet 1572), ap-17.6.0.97 (Aironet 1572), ap-17.6.0.97 (Aironet 1702), 8.10(158.64) (Aironet 1702), 8.10(158.64) (Aironet 2702), ap-17.6.0.97 (Aironet 2702), ap-17.6.0.97 (Aironet 3702), 8.10(158.64) (Aironet 3702), 8.10(158.64) (IW 3702), ap-17.6.0.97 (IW 3702), ap-17.6.0.31 (Catalyst 9115 Wi-Fi 6), ap-17.6.0.31 (Catalyst 9120), ap-17.6.0.31 (Integrated AP on 1100 Integrated Services Routers), i9305 4.4.4 (Samsung Galaxy S3), ap-17.6.0.97 (Aironet 1552H), - (Альт 8 СП), до 2.4 (ОСОН ОСнова Оnyx), от 4.0 до 4.9.270 включительно (Linux), от 4.10 до 4.19.192 включительно (Linux), от 4.20 до 5.10.41 включительно (Linux), - (Windows Server 2012 (Server Core installation)), от 5.11 до 5.12.8 включительно (Linux)
Possible Mitigations
Использование рекомендаций: Для программных продуктов Red Hat Inc.: https://access.redhat.com/security/cve/CVE-2020-24587 Для Linux: https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.193 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.271 https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.42 https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.9 Для программных продуктов Microsoft Corp.: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-24587 Для программных продуктов Cisco Systems Inc.: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu Для ОСОН Основа: Обновление программного обеспечения linux до версии 5.14.9-2.osnova179.1 Для ОС Альт 8 СП: установка обновления из публичного репозитория программного средства
Reference
http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-24587 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587 https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.193 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.271 https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.42 https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.9 https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/ https://lore.kernel.org/linux-wireless/20210511200110.037aa5ca0390.I7bb888e2965a0db02a67075fcb5deb50eb7408aa@changeid/ https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/ https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-24587 https://nvd.nist.gov/vuln/detail/CVE-2020-24587 https://papers.mathyvanhoef.com/usenix2021.pdf https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5001-1 https://ubuntu.com/security/notices/USN-5018-1 https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.cve.org/CVERecord?id=CVE-2020-24587 https://www.fragattacks.com https://www.fragattacks.com/ https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.4/ https://altsp.su/obnovleniya-bezopasnosti/
CWE
CWE-326, CWE-327

{
  "CVSS 2.0": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
  "CVSS 3.0": "AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp, Red Hat Inc., Cisco Systems Inc., Samsung Electronics, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Windows 7 Service Pack 1), - (Windows Server 2008 Service Pack 2), - (Windows 8.1), - (Windows Server 2012), - (Windows Server 2012 R2), - (Windows Server 2008 R2 Service Pack 1), - (Windows 10), - (Windows 10 1607), - (Windows Server 2016), - (Windows RT 8.1), - (Windows Server 2008 Service Pack 2 (Server Core Installation)), - (Windows Server 2012 R2 (Server Core installation)), - (Windows Server 2016 (Server Core installation)), - (Windows Server 2008 R2 Service Pack 1 (Server Core installation)), - (Windows 10 1803), - (Windows 10 1809), - (Windows Server 2019), - (Windows Server 2019 (Server Core installation)), 8 (Red Hat Enterprise Linux), - (Windows 10 1909), - (Windows Server 1909 (Server Core Installation)), - (Windows 10 2004), - (Windows Server 2004 (Server Core Installation)), - (Windows 10 20H2), - (Windows Server 20H2 (Server Core Installation)), 12.8(1)SR1 (Cisco IP Conference Phone 8832), 11.3(3) (Cisco IP Phone 6861 with Multiplatform), 12.8(1)SR1 (Cisco IP Phone 8861), 12.8(1)SR1 (Cisco IP Phone 8865), 11.3(4) (Cisco IP Phone 8861 Running Third-Party Call Control (3PCC) Software), 11.0(6)SR1 (Cisco IP Phone 8821), 9.15.2-RoomOS_March_2021 (Webex Room), 10.2.1-RoomOS_March_2021 (Webex Room), 9.15.0.11 (Webex Desk), 10.3.1-RoomOS_April_2021 (Webex Board), 1.1(0) (Webex Wireless Phone 860), 1.1(0) (Webex Wireless Phone 840), ap-17.3.4.15 (Cisco Aironet 1560), ap-17.3.4.15 (Cisco Aironet 2800), ap-17.3.4.15 (Cisco Aironet 3800), ap-17.3.4.15 (Cisco Aironet 4800), ap-17.3.4.15 (Catalyst IW 6300), ap-17.6.0.31 (Aironet 1542), ap-17.6.0.31 (Aironet 1810), ap-17.6.0.31 (Aironet 1815), ap-17.6.0.31 (Aironet 1832), ap-17.6.0.31 (Aironet 1842), ap-17.6.0.31 (Aironet 1852), ap-17.6.0.31 (Aironet 1800i), ap-17.6.0.31 (Catalyst 9117), ap-17.6.0.31 (Catalyst 9124), ap-17.6.0.31 (Catalyst 9130), 8.10(158.64) (Aironet 1552), ap-17.6.0.97 (Aironet 1552), 8.10(158.64) (Aironet 1552H), 8.10(158.64) (Aironet 1572), ap-17.6.0.97 (Aironet 1572), ap-17.6.0.97 (Aironet 1702), 8.10(158.64) (Aironet 1702), 8.10(158.64) (Aironet 2702), ap-17.6.0.97 (Aironet 2702), ap-17.6.0.97 (Aironet 3702), 8.10(158.64) (Aironet 3702), 8.10(158.64) (IW 3702), ap-17.6.0.97 (IW 3702), ap-17.6.0.31 (Catalyst 9115 Wi-Fi 6), ap-17.6.0.31 (Catalyst 9120), ap-17.6.0.31 (Integrated AP on 1100 Integrated Services Routers), i9305 4.4.4 (Samsung Galaxy S3), ap-17.6.0.97 (Aironet 1552H), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), \u0434\u043e 2.4 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u043e\u0442 4.0 \u0434\u043e 4.9.270 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.10 \u0434\u043e 4.19.192 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.20 \u0434\u043e 5.10.41 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), - (Windows Server 2012 (Server Core installation)), \u043e\u0442 5.11 \u0434\u043e 5.12.8 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2020-24587\n\n\u0414\u043b\u044f Linux:\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.193\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.271\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.42\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.9\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Microsoft Corp.:\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-24587\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Cisco Systems Inc.:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu\n\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f linux \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 5.14.9-2.osnova179.1\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "10.05.2021",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.09.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.06.2021",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-03088",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-24587",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Windows 7 Service Pack 1, Windows Server 2008 Service Pack 2, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1, Windows 10, Windows 10 1607, Windows Server 2016, Windows RT 8.1, Windows Server 2008 Service Pack 2 (Server Core Installation), Windows Server 2012 R2 (Server Core installation), Windows Server 2016 (Server Core installation), Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows 10 1803, Windows 10 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Red Hat Enterprise Linux, Windows 10 1909, Windows Server 1909 (Server Core Installation), Windows 10 2004, Windows Server 2004 (Server Core Installation), Windows 10 20H2, Windows Server 20H2 (Server Core Installation), Cisco IP Conference Phone 8832, Cisco IP Phone 6861 with Multiplatform, Cisco IP Phone 8861, Cisco IP Phone 8865, Cisco IP Phone 8861 Running Third-Party Call Control (3PCC) Software, Cisco IP Phone 8821, Webex Room, Webex Desk, Webex Board, Webex Wireless Phone 860, Webex Wireless Phone 840, Cisco Aironet 1560, Cisco Aironet 2800, Cisco Aironet 3800, Cisco Aironet 4800, Catalyst IW 6300, Aironet 1542, Aironet 1810, Aironet 1815, Aironet 1832, Aironet 1842, Aironet 1852, Aironet 1800i, Catalyst 9117, Catalyst 9124, Catalyst 9130, Aironet 1552, Aironet 1552H, Aironet 1572, Aironet 1702, Aironet 2702, Aironet 3702, IW 3702, Catalyst 9115 Wi-Fi 6, Catalyst 9120, Integrated AP on 1100 Integrated Services Routers, Samsung Galaxy S3, \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), Linux, Windows Server 2012 (Server Core installation)",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows 7 Service Pack 1 - 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 - 32-bit, Microsoft Corp Windows 7 Service Pack 1 - 32-bit, Microsoft Corp Windows 8.1 - 64-bit, Microsoft Corp Windows 8.1 - 32-bit, Microsoft Corp Windows Server 2008 Service Pack 2 - 64-bit, Microsoft Corp Windows Server 2012 - , Microsoft Corp Windows Server 2012 R2 - , Microsoft Corp Windows Server 2008 R2 Service Pack 1 - 64-bit, Microsoft Corp Windows 10 - 64-bit, Microsoft Corp Windows 10 - 32-bit, Microsoft Corp Windows 10 1607 - 64-bit, Microsoft Corp Windows 10 1607 - 32-bit, Microsoft Corp Windows Server 2016 - , Microsoft Corp Windows RT 8.1 - , Microsoft Corp Windows Server 2008 Service Pack 2 (Server Core Installation) - 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 (Server Core Installation) - 32-bit, Microsoft Corp Windows Server 2012 R2 (Server Core installation) - , Microsoft Corp Windows Server 2016 (Server Core installation) - , Microsoft Corp Windows Server 2008 R2 Service Pack 1 (Server Core installation) - 64-bit, Microsoft Corp Windows 10 1803 - 64-bit, Microsoft Corp Windows 10 1803 - 32-bit, Microsoft Corp Windows 10 1809 - 64-bit, Microsoft Corp Windows 10 1809 - 32-bit, Microsoft Corp Windows Server 2019 - , Microsoft Corp Windows Server 2019 (Server Core installation) - , Microsoft Corp Windows 10 1809 - ARM64, Microsoft Corp Windows 10 1803 - ARM64, Red Hat Inc. Red Hat Enterprise Linux 8 , Microsoft Corp Windows 10 1909 - 32-bit, Microsoft Corp Windows 10 1909 - 64-bit, Microsoft Corp Windows 10 1909 - ARM64, Microsoft Corp Windows Server 1909 (Server Core Installation) - , Microsoft Corp Windows 10 2004 - 32-bit, Microsoft Corp Windows 10 2004 - 64-bit, Microsoft Corp Windows 10 2004 - ARM64, Microsoft Corp Windows Server 2004 (Server Core Installation) - , Microsoft Corp Windows 10 20H2 - ARM64, Microsoft Corp Windows 10 20H2 - 32-bit, Microsoft Corp Windows 10 20H2 - 64-bit, Microsoft Corp Windows Server 20H2 (Server Core Installation) - , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f -  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), Microsoft Corp Windows Server 2012 (Server Core installation) - ",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 WPA, WPA2 \u0438 WPA3 \u043d\u0430\u0431\u043e\u0440\u0430 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043e\u0432 \u0441\u0432\u044f\u0437\u0438 \u0434\u043b\u044f \u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0438 IEEE 802.11, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0421\u043b\u0430\u0431\u043e\u0435 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435 (CWE-326), \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u044b \u0438\u043b\u0438 \u0440\u0438\u0441\u043a\u0438 (CWE-327)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 WPA, WPA2 \u0438 WPA3 \u043d\u0430\u0431\u043e\u0440\u0430 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043e\u0432 \u0441\u0432\u044f\u0437\u0438 \u0434\u043b\u044f \u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0438 IEEE 802.11 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u0441\u0442\u043e\u0439\u043a\u043e\u0441\u0442\u044c\u044e \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0417\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://www.openwall.com/lists/oss-security/2021/05/11/12\nhttps://access.redhat.com/security/cve/CVE-2020-24587\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587\nhttps://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.193\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.271\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.42\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.9\nhttps://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\nhttps://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\nhttps://lists.debian.org/debian-lts-announce/2023/04/msg00002.html\nhttps://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/\nhttps://lore.kernel.org/linux-wireless/20210511200110.037aa5ca0390.I7bb888e2965a0db02a67075fcb5deb50eb7408aa@changeid/\nhttps://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-24587\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-24587\nhttps://papers.mathyvanhoef.com/usenix2021.pdf\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu\nhttps://ubuntu.com/security/notices/USN-4997-1\nhttps://ubuntu.com/security/notices/USN-4997-2\nhttps://ubuntu.com/security/notices/USN-4999-1\nhttps://ubuntu.com/security/notices/USN-5000-1\nhttps://ubuntu.com/security/notices/USN-5000-2\nhttps://ubuntu.com/security/notices/USN-5001-1\nhttps://ubuntu.com/security/notices/USN-5018-1\nhttps://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63\nhttps://www.cve.org/CVERecord?id=CVE-2020-24587\nhttps://www.fragattacks.com\nhttps://www.fragattacks.com/\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.4/\nhttps://altsp.su/obnovleniya-bezopasnosti/",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-326, CWE-327",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 1,8)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2,6)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…