Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2020-26142
Vulnerability from cvelistv5
Published
2021-05-11 19:41
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.153Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T14:22:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "name": "https://www.fragattacks.com", "refsource": "MISC", "url": "https://www.fragattacks.com" }, { "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", "refsource": "MISC", "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26142", "datePublished": "2021-05-11T19:41:14", "dateReserved": "2020-09-29T00:00:00", "dateUpdated": "2024-08-04T15:49:07.153Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-26142\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-05-11T20:15:08.760\",\"lastModified\":\"2024-11-21T05:19:21.237\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema en el kernel en OpenBSD versi\u00f3n 6.6. Las implementaciones WEP, WPA, WPA2 y WPA3 tratan las tramas fragmentadas como tramas completas. Un adversario puede abusar de esto para inyectar paquetes de red arbitrarios, independientemente de la configuraci\u00f3n de la red\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E0CC007-1428-4683-A196-3544F1C9CC92\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/11/12\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.fragattacks.com\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/11/12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.fragattacks.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ICSA-21-236-01
Vulnerability from csaf_cisa
Published
2021-08-24 00:00
Modified
2021-08-24 00:00
Summary
Hitachi ABB Power Grids TropOS
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could allow an attacker to direct a client that is connected to a TropOS Wi-Fi access point to fake websites and extract sensitive data.
Critical infrastructure sectors
Critical Manufacturing, Energy
Countries/areas deployed
Worldwide
Company headquarters location
Switzerland
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Exploitability
These vulnerabilities are not exploitable remotely. No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "organization": "Hitachi ABB Power Grids", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to direct a client that is connected to a TropOS Wi-Fi access point to fake websites and extract sensitive data.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "These vulnerabilities are not exploitable remotely. No known public exploits specifically target these vulnerabilities.\n", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-21-236-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-236-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-236-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-236-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Hitachi ABB Power Grids TropOS", "tracking": { "current_release_date": "2021-08-24T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-236-01", "initial_release_date": "2021-08-24T00:00:00.000000Z", "revision_history": [ { "date": "2021-08-24T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-236-01 Hitachi ABB Power Grids TropOS" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 8.9.4.8", "product": { "name": "TropOS: Firmware Version 8.9.4.8 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "TropOS" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-24586", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this vulnerability can be exploited to inject arbitrary network packets and/or exfiltrate user data.CVE-2020-24586 has been assigned to this vulnerability. A CVSS v3 base score of 3.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24586" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require all fragments of a frame are encrypted under the same key. An adversary could exploit this vulnerability to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.CVE-2020-24587 has been assigned to this vulnerability. A CVSS v3 base score of 2.6 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24587" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-24588", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require the A-MSDU flag in the plaintext QoS header field be authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary could exploit this vulnerability to inject arbitrary network packets.CVE-2020-24588 has been assigned to this vulnerability. A CVSS v3 base score of 3.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24588" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26139", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An access point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.CVE-2020-26139 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26139" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26140", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can exploit this vulnerability to inject arbitrary data frames independent of the network configuration.CVE-2020-26140 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26140" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26141", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "The Wi-Fi implementation does not verify the message integrity check (authenticity) of fragmented TKIP frames. An adversary can exploit this vulnerability to inject and decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.CVE-2020-26141 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26141" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26142", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26142 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26142" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26143", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can exploit this vulnerability to inject arbitrary data frames independent of the network configuration.CVE-2020-26143 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26143" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26144", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first eight bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26144 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26144" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26145", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments when sent in plaintext and process them as full unfragmented frames. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26145 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26145" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26146", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can exploit this vulnerability to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note: WEP is vulnerable to this attack by design.CVE-2020-26146 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26146" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26147", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. An adversary can exploit this vulnerability to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.CVE-2020-26147 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26147" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
icsa-21-236-01
Vulnerability from csaf_cisa
Published
2021-08-24 00:00
Modified
2021-08-24 00:00
Summary
Hitachi ABB Power Grids TropOS
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could allow an attacker to direct a client that is connected to a TropOS Wi-Fi access point to fake websites and extract sensitive data.
Critical infrastructure sectors
Critical Manufacturing, Energy
Countries/areas deployed
Worldwide
Company headquarters location
Switzerland
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Exploitability
These vulnerabilities are not exploitable remotely. No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "organization": "Hitachi ABB Power Grids", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to direct a client that is connected to a TropOS Wi-Fi access point to fake websites and extract sensitive data.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "These vulnerabilities are not exploitable remotely. No known public exploits specifically target these vulnerabilities.\n", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-21-236-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-236-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-236-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-236-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Hitachi ABB Power Grids TropOS", "tracking": { "current_release_date": "2021-08-24T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-236-01", "initial_release_date": "2021-08-24T00:00:00.000000Z", "revision_history": [ { "date": "2021-08-24T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-236-01 Hitachi ABB Power Grids TropOS" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 8.9.4.8", "product": { "name": "TropOS: Firmware Version 8.9.4.8 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "TropOS" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-24586", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this vulnerability can be exploited to inject arbitrary network packets and/or exfiltrate user data.CVE-2020-24586 has been assigned to this vulnerability. A CVSS v3 base score of 3.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24586" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require all fragments of a frame are encrypted under the same key. An adversary could exploit this vulnerability to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.CVE-2020-24587 has been assigned to this vulnerability. A CVSS v3 base score of 2.6 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24587" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-24588", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require the A-MSDU flag in the plaintext QoS header field be authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary could exploit this vulnerability to inject arbitrary network packets.CVE-2020-24588 has been assigned to this vulnerability. A CVSS v3 base score of 3.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24588" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26139", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An access point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.CVE-2020-26139 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26139" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26140", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can exploit this vulnerability to inject arbitrary data frames independent of the network configuration.CVE-2020-26140 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26140" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26141", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "The Wi-Fi implementation does not verify the message integrity check (authenticity) of fragmented TKIP frames. An adversary can exploit this vulnerability to inject and decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.CVE-2020-26141 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26141" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26142", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26142 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26142" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26143", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can exploit this vulnerability to inject arbitrary data frames independent of the network configuration.CVE-2020-26143 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26143" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26144", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first eight bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26144 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26144" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26145", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments when sent in plaintext and process them as full unfragmented frames. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26145 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26145" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26146", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can exploit this vulnerability to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note: WEP is vulnerable to this attack by design.CVE-2020-26146 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26146" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26147", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. An adversary can exploit this vulnerability to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.CVE-2020-26147 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26147" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "vendor_fix", "details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
gsd-2020-26142
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-26142", "description": "An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.", "id": "GSD-2020-26142", "references": [ "https://www.suse.com/security/cve/CVE-2020-26142.html", "https://security.archlinux.org/CVE-2020-26142", "https://linux.oracle.com/cve/CVE-2020-26142.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-26142" ], "details": "An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.", "id": "GSD-2020-26142", "modified": "2023-12-13T01:22:08.806707Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "name": "https://www.fragattacks.com", "refsource": "MISC", "url": "https://www.fragattacks.com" }, { "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", "refsource": "MISC", "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:openbsd:openbsd:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26142" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-74" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.fragattacks.com", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6 } }, "lastModifiedDate": "2021-12-03T21:12Z", "publishedDate": "2021-05-11T20:15Z" } } }
wid-sec-w-2022-2069
Vulnerability from csaf_certbund
Published
2021-05-11 22:00
Modified
2023-07-11 22:00
Summary
IEEE 802.11 (WLAN): Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IEEE 802.11 definiert die Wireless-LAN (WLAN) Standards.
WPA2 ist der aktuelle Verschlüsselungsstandard für Wireless LAN.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der IEEE 802.11 Spezifikation und zahlreichen Implementierungen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Netzwerkverkehr zu manipulieren und um Informationen offenzulegen.
Betroffene Betriebssysteme
- UNIX
- Linux
- MacOS X
- Windows
- Android
- iPhoneOS
- CISCO Appliance
- Juniper Appliance
- Sonstiges
- Hardware Appliance
- Appliance
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IEEE 802.11 definiert die Wireless-LAN (WLAN) Standards.\r\nWPA2 ist der aktuelle Verschl\u00fcsselungsstandard f\u00fcr Wireless LAN.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der IEEE 802.11 Spezifikation und zahlreichen Implementierungen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Netzwerkverkehr zu manipulieren und um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- MacOS X\n- Windows\n- Android\n- iPhoneOS\n- CISCO Appliance\n- Juniper Appliance\n- Sonstiges\n- Hardware Appliance\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2069 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2069.json" }, { "category": "self", "summary": "WID-SEC-2022-2069 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2069" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2809-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015470.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3380 vom 2023-04-01", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" }, { "category": "external", "summary": "Wi-Fi Alliance security update vom 2021-05-11", "url": "https://www.wi-fi.org/security-update-fragmentation" }, { "category": "external", "summary": "FragAttacks Test Tool", "url": "https://github.com/vanhoefm/fragattacks" }, { "category": "external", "summary": "Aruba Product Security Advisory PSA-2021-011", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-011.txt" }, { "category": "external", "summary": "FragAttack Website", "url": "https://www.fragattacks.com/" }, { "category": "external", "summary": "Arista Security Advisory", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24587" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24588" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26144" }, { "category": "external", "summary": "Cisco Security Advisory cisco-sa-wifi-faf-22epcEWu", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-00473", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "category": "external", "summary": "AVM Sicherheitshinweise vom 2021-05-11", "url": "https://avm.de/service/aktuelle-sicherheitshinweise/" }, { "category": "external", "summary": "Juniper Security Advisory JSA11170 vom 20201-05-11", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11170" }, { "category": "external", "summary": "Linux Kernel Patches vom 2021-05-11", "url": "https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-57316 vom 2021-05-11", "url": "https://support.lenovo.com/de/de/product_security/ps500405-intel-proset-and-wireless-wifi-intel-vpro-csme-wifi-and-intel-killer-wifi-advisory" }, { "category": "external", "summary": "BSI-Cyber-Sicherheitswarnung vom 2021-05-11", "url": "https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2021/2021-216748-1032.pdf?__blob=publicationFile\u0026v=3" }, { "category": "external", "summary": "Deutsche Telekom Pressemeldung zu FragAttack vom 2021-05-12", "url": "https://www.telekom.com/de/konzern/details/fragattack-luecke-im-wlan-standard-626972" }, { "category": "external", "summary": "SYNOLOGY Security Advisory SYNOLOGY-SA-21:20 vom 2021-05-12", "url": "https://www.synology.com/en-global/support/security/Synology_SA_21_20" }, { "category": "external", "summary": "Zyxel security advisory for FragAttacks against WiFi products vom 2021-05-13", "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_FragAttacks_against_WiFi_products.shtml" }, { "category": "external", "summary": "EMC Security Advisory DSA-2021-100 vom 2021-05-17", "url": "https://www.dell.com/support/kbdoc/de-de/000186331/dsa-2021-100-dell-client-platform-security-update-for-intel-wifi-software-vulnerabilitiesdsa-2021-100-dell-client-platform-security-update-for-intel-wifi-software-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1912-1 vom 2021-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1913-1 vom 2021-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1899-1 vom 2021-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1888-1 vom 2021-06-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1889-1 vom 2021-06-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1887-1 vom 2021-06-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1890-1 vom 2021-06-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1891-1 vom 2021-06-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1977-1 vom 2021-06-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1975-1 vom 2021-06-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2690 vom 2021-06-23", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2689 vom 2021-06-23", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4997-1 vom 2021-06-23", "url": "https://ubuntu.com/security/notices/USN-4997-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4999-1 vom 2021-06-23", "url": "https://ubuntu.com/security/notices/USN-4999-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5001-1 vom 2021-06-23", "url": "https://ubuntu.com/security/notices/USN-5001-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5000-1 vom 2021-06-23", "url": "https://ubuntu.com/security/notices/USN-5000-1" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbnw04145en_us" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5000-2 vom 2021-06-25", "url": "https://ubuntu.com/security/notices/USN-5000-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4997-2 vom 2021-06-25", "url": "https://ubuntu.com/security/notices/USN-4997-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2208-1 vom 2021-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14764-1 vom 2021-07-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2324-1 vom 2021-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2349-1 vom 2021-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2321-1 vom 2021-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5018-1 vom 2021-07-21", "url": "https://ubuntu.com/security/notices/USN-5018-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2406-1 vom 2021-07-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2427-1 vom 2021-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009190.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2421-1 vom 2021-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2422-1 vom 2021-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2451-1 vom 2021-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9406 vom 2021-08-10", "url": "http://linux.oracle.com/errata/ELSA-2021-9406.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9404 vom 2021-08-10", "url": "http://linux.oracle.com/errata/ELSA-2021-9404.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9452 vom 2021-09-21", "url": "https://linux.oracle.com/errata/ELSA-2021-9452.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9453 vom 2021-09-21", "url": "https://linux.oracle.com/errata/ELSA-2021-9453.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9459 vom 2021-09-22", "url": "http://linux.oracle.com/errata/ELSA-2021-9459.html" }, { "category": "external", "summary": "ORACLE OVMSA-2021-0031 vom 2021-09-22", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-September/001030.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08", "url": "http://linux.oracle.com/errata/ELSA-2021-9473.html" }, { "category": "external", "summary": "ORACLE OVMSA-2021-0035 vom 2021-10-12", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4140 vom 2021-11-10", "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4356 vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-004 vom 2022-01-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-004.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-002 vom 2022-01-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-002.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5299-1 vom 2022-02-22", "url": "https://ubuntu.com/security/notices/USN-5299-1" }, { "category": "external", "summary": "FreeBSD Security Advisory FREEBSD-SA-22:02.WIFI vom 2022-03-15", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-22:02.wifi.asc" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5343-1 vom 2022-03-22", "url": "https://ubuntu.com/security/notices/USN-5343-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9999 vom 2022-11-16", "url": "http://linux.oracle.com/errata/ELSA-2022-9999.html" }, { "category": "external", "summary": "HP Security Bulletin HPSBPI03763 vom 2022-12-15", "url": "https://support.hp.com/de-de/document/ish_5610341-5610907-16/HPSBPI03763" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0394-1 vom 2023-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0433-1 vom 2023-02-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" } ], "source_lang": "en-US", "title": "IEEE 802.11 (WLAN): Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-07-11T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:03:34.512+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-2069", "initial_release_date": "2021-05-11T22:00:00.000+00:00", "revision_history": [ { "date": "2021-05-11T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-05-13T22:00:00.000+00:00", "number": "2", "summary": "Neue Informationen von Zyxel aufgenommen" }, { "date": "2021-05-16T22:00:00.000+00:00", "number": "3", "summary": "Produktzuordnung bzgl. Arista korrigiert" }, { "date": "2021-06-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-06-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-06-15T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-06-22T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Debian und Ubuntu aufgenommen" }, { "date": "2021-06-27T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von HP und Ubuntu aufgenommen" }, { "date": "2021-06-30T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-07-13T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-07-14T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-07-20T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2021-07-21T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-07-22T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-08-09T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-09-20T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-09-22T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux und ORACLE aufgenommen" }, { "date": "2021-10-10T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-10-11T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2021-11-09T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-30T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-02-21T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-03-15T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von FreeBSD aufgenommen" }, { "date": "2022-03-22T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-11-16T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-12-14T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-02-13T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-02-15T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-02T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-07-11T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "30" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "AVM FRITZ!Box", "product": { "name": "AVM FRITZ!Box", "product_id": "T002543", "product_identification_helper": { "cpe": "cpe:/o:avm:fritzos:-" } } } ], "category": "vendor", "name": "AVM" }, { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Apple iOS", "product": { "name": "Apple iOS", "product_id": "T005205", "product_identification_helper": { "cpe": "cpe:/o:apple:iphone_os:-" } } }, { "category": "product_name", "name": "Apple iPadOS", "product": { "name": "Apple iPadOS", "product_id": "T016605", "product_identification_helper": { "cpe": "cpe:/o:apple:ipados:-" } } }, { "category": "product_name", "name": "Apple macOS", "product": { "name": "Apple macOS", "product_id": "697", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:-" } } } ], "category": "vendor", "name": "Apple" }, { "branches": [ { "category": "product_name", "name": "Arista WiFi Access Point", "product": { "name": "Arista WiFi Access Point", "product_id": "T019358", "product_identification_helper": { "cpe": "cpe:/h:arista:wifi_access_point:-" } } } ], "category": "vendor", "name": "Arista" }, { "branches": [ { "category": "product_name", "name": "Aruba ArubaOS", "product": { "name": "Aruba ArubaOS", "product_id": "T016785", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:-" } } } ], "category": "vendor", "name": "Aruba" }, { "branches": [ { "category": "product_name", "name": "Cisco Aironet Access Point", "product": { "name": "Cisco Aironet Access Point", "product_id": "T012215", "product_identification_helper": { "cpe": "cpe:/o:cisco:aironet_access_point_software:-" } } }, { "category": "product_name", "name": "Cisco Catalyst", "product": { "name": "Cisco Catalyst", "product_id": "T000491", "product_identification_helper": { "cpe": "cpe:/h:cisco:catalyst:-" } } }, { "category": "product_name", "name": "Cisco IP Phone", "product": { "name": "Cisco IP Phone", "product_id": "2070", "product_identification_helper": { "cpe": "cpe:/h:cisco:ip_phone:-" } } }, { "branches": [ { "category": "product_name", "name": "Cisco WebEx Wireless Phone", "product": { "name": "Cisco WebEx Wireless Phone", "product_id": "T018746", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:wireless_phone" } } }, { "category": "product_name", "name": "Cisco WebEx Desk Series", "product": { "name": "Cisco WebEx Desk Series", "product_id": "T019302", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:desk_series" } } }, { "category": "product_name", "name": "Cisco WebEx Room Series", "product": { "name": "Cisco WebEx Room Series", "product_id": "T019303", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:room_series" } } }, { "category": "product_name", "name": "Cisco WebEx Board Series", "product": { "name": "Cisco WebEx Board Series", "product_id": "T019304", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:board_series" } } } ], "category": "product_name", "name": "WebEx" }, { "category": "product_name", "name": "Cisco Wireless IP Phone", "product": { "name": "Cisco Wireless IP Phone", "product_id": "T015978", "product_identification_helper": { "cpe": "cpe:/h:cisco:wireless_ip_phone:8821" } } } ], "category": "vendor", "name": "Cisco" }, { "branches": [ { "category": "product_name", "name": "D-LINK Router", "product": { "name": "D-LINK Router", "product_id": "T009493", "product_identification_helper": { "cpe": "cpe:/h:d-link:router:-" } } } ], "category": "vendor", "name": "D-LINK" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T006498", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "category": "product_name", "name": "Google Android", "product": { "name": "Google Android", "product_id": "132177", "product_identification_helper": { "cpe": "cpe:/o:google:android:-" } } } ], "category": "vendor", "name": "Google" }, { "branches": [ { "category": "product_name", "name": "HP LaserJet", "product": { "name": "HP LaserJet", "product_id": "T000052", "product_identification_helper": { "cpe": "cpe:/h:hp:laserjet:p3015" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "Intel PROSet Wireless WiFi Software", "product": { "name": "Intel PROSet Wireless WiFi Software", "product_id": "T015357", "product_identification_helper": { "cpe": "cpe:/a:intel:proset_wireless:-" } } } ], "category": "vendor", "name": "Intel" }, { "branches": [ { "category": "product_name", "name": "Juniper SRX Series", "product": { "name": "Juniper SRX Series", "product_id": "T008011", "product_identification_helper": { "cpe": "cpe:/h:juniper:srx_service_gateways:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "LANCOM Router", "product": { "name": "LANCOM Router", "product_id": "T019305", "product_identification_helper": { "cpe": "cpe:/h:lancom:router:-" } } } ], "category": "vendor", "name": "LANCOM" }, { "branches": [ { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T006520", "product_identification_helper": { "cpe": "cpe:/o:lenovo:lenovo_computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows", "product": { "name": "Microsoft Windows", "product_id": "7107", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows:-" } } } ], "category": "vendor", "name": "Microsoft" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "6368", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Specification WPA2", "product": { "name": "Specification WPA2", "product_id": "T010954", "product_identification_helper": { "cpe": "cpe:/h:ieee:wpa2:-" } } } ], "category": "vendor", "name": "Specification" }, { "branches": [ { "category": "product_name", "name": "Synology NAS", "product": { "name": "Synology NAS", "product_id": "T016423", "product_identification_helper": { "cpe": "cpe:/h:synology:nas:-" } } } ], "category": "vendor", "name": "Synology" }, { "branches": [ { "category": "product_name", "name": "Telekom Speedport", "product": { "name": "Telekom Speedport", "product_id": "T019316", "product_identification_helper": { "cpe": "cpe:/h:telekom:speedport:-" } } } ], "category": "vendor", "name": "Telekom" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "category": "product_name", "name": "Zyxel Firewall", "product": { "name": "Zyxel Firewall", "product_id": "T019338", "product_identification_helper": { "cpe": "cpe:/h:zyxel:firewall:-" } } } ], "category": "vendor", "name": "Zyxel" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-11264", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-11264" }, { "cve": "CVE-2020-11301", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-11301" }, { "cve": "CVE-2020-24586", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-24588" }, { "cve": "CVE-2020-26139", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26139" }, { "cve": "CVE-2020-26140", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26140" }, { "cve": "CVE-2020-26141", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26141" }, { "cve": "CVE-2020-26142", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26142" }, { "cve": "CVE-2020-26143", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26143" }, { "cve": "CVE-2020-26144", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26144" }, { "cve": "CVE-2020-26145", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26145" }, { "cve": "CVE-2020-26146", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26146" }, { "cve": "CVE-2020-26147", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26147" } ] }
WID-SEC-W-2022-2069
Vulnerability from csaf_certbund
Published
2021-05-11 22:00
Modified
2023-07-11 22:00
Summary
IEEE 802.11 (WLAN): Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IEEE 802.11 definiert die Wireless-LAN (WLAN) Standards.
WPA2 ist der aktuelle Verschlüsselungsstandard für Wireless LAN.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der IEEE 802.11 Spezifikation und zahlreichen Implementierungen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Netzwerkverkehr zu manipulieren und um Informationen offenzulegen.
Betroffene Betriebssysteme
- UNIX
- Linux
- MacOS X
- Windows
- Android
- iPhoneOS
- CISCO Appliance
- Juniper Appliance
- Sonstiges
- Hardware Appliance
- Appliance
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IEEE 802.11 definiert die Wireless-LAN (WLAN) Standards.\r\nWPA2 ist der aktuelle Verschl\u00fcsselungsstandard f\u00fcr Wireless LAN.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der IEEE 802.11 Spezifikation und zahlreichen Implementierungen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Netzwerkverkehr zu manipulieren und um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- MacOS X\n- Windows\n- Android\n- iPhoneOS\n- CISCO Appliance\n- Juniper Appliance\n- Sonstiges\n- Hardware Appliance\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2069 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2069.json" }, { "category": "self", "summary": "WID-SEC-2022-2069 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2069" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2809-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015470.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3380 vom 2023-04-01", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" }, { "category": "external", "summary": "Wi-Fi Alliance security update vom 2021-05-11", "url": "https://www.wi-fi.org/security-update-fragmentation" }, { "category": "external", "summary": "FragAttacks Test Tool", "url": "https://github.com/vanhoefm/fragattacks" }, { "category": "external", "summary": "Aruba Product Security Advisory PSA-2021-011", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-011.txt" }, { "category": "external", "summary": "FragAttack Website", "url": "https://www.fragattacks.com/" }, { "category": "external", "summary": "Arista Security Advisory", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24587" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24588" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26144" }, { "category": "external", "summary": "Cisco Security Advisory cisco-sa-wifi-faf-22epcEWu", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-00473", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "category": "external", "summary": "AVM Sicherheitshinweise vom 2021-05-11", "url": "https://avm.de/service/aktuelle-sicherheitshinweise/" }, { "category": "external", "summary": "Juniper Security Advisory JSA11170 vom 20201-05-11", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11170" }, { "category": "external", "summary": "Linux Kernel Patches vom 2021-05-11", "url": "https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-57316 vom 2021-05-11", "url": "https://support.lenovo.com/de/de/product_security/ps500405-intel-proset-and-wireless-wifi-intel-vpro-csme-wifi-and-intel-killer-wifi-advisory" }, { "category": "external", "summary": "BSI-Cyber-Sicherheitswarnung vom 2021-05-11", "url": "https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2021/2021-216748-1032.pdf?__blob=publicationFile\u0026v=3" }, { "category": "external", "summary": "Deutsche Telekom Pressemeldung zu FragAttack vom 2021-05-12", "url": "https://www.telekom.com/de/konzern/details/fragattack-luecke-im-wlan-standard-626972" }, { "category": "external", "summary": "SYNOLOGY Security Advisory SYNOLOGY-SA-21:20 vom 2021-05-12", "url": "https://www.synology.com/en-global/support/security/Synology_SA_21_20" }, { "category": "external", "summary": "Zyxel security advisory for FragAttacks against WiFi products vom 2021-05-13", "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_FragAttacks_against_WiFi_products.shtml" }, { "category": "external", "summary": "EMC Security Advisory DSA-2021-100 vom 2021-05-17", "url": "https://www.dell.com/support/kbdoc/de-de/000186331/dsa-2021-100-dell-client-platform-security-update-for-intel-wifi-software-vulnerabilitiesdsa-2021-100-dell-client-platform-security-update-for-intel-wifi-software-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1912-1 vom 2021-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1913-1 vom 2021-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1899-1 vom 2021-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1888-1 vom 2021-06-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1889-1 vom 2021-06-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1887-1 vom 2021-06-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1890-1 vom 2021-06-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1891-1 vom 2021-06-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1977-1 vom 2021-06-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1975-1 vom 2021-06-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2690 vom 2021-06-23", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2689 vom 2021-06-23", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4997-1 vom 2021-06-23", "url": "https://ubuntu.com/security/notices/USN-4997-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4999-1 vom 2021-06-23", "url": "https://ubuntu.com/security/notices/USN-4999-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5001-1 vom 2021-06-23", "url": "https://ubuntu.com/security/notices/USN-5001-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5000-1 vom 2021-06-23", "url": "https://ubuntu.com/security/notices/USN-5000-1" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbnw04145en_us" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5000-2 vom 2021-06-25", "url": "https://ubuntu.com/security/notices/USN-5000-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4997-2 vom 2021-06-25", "url": "https://ubuntu.com/security/notices/USN-4997-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2208-1 vom 2021-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14764-1 vom 2021-07-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2324-1 vom 2021-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2349-1 vom 2021-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2321-1 vom 2021-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5018-1 vom 2021-07-21", "url": "https://ubuntu.com/security/notices/USN-5018-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2406-1 vom 2021-07-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2427-1 vom 2021-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009190.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2421-1 vom 2021-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2422-1 vom 2021-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2451-1 vom 2021-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9406 vom 2021-08-10", "url": "http://linux.oracle.com/errata/ELSA-2021-9406.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9404 vom 2021-08-10", "url": "http://linux.oracle.com/errata/ELSA-2021-9404.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9452 vom 2021-09-21", "url": "https://linux.oracle.com/errata/ELSA-2021-9452.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9453 vom 2021-09-21", "url": "https://linux.oracle.com/errata/ELSA-2021-9453.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9459 vom 2021-09-22", "url": "http://linux.oracle.com/errata/ELSA-2021-9459.html" }, { "category": "external", "summary": "ORACLE OVMSA-2021-0031 vom 2021-09-22", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-September/001030.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08", "url": "http://linux.oracle.com/errata/ELSA-2021-9473.html" }, { "category": "external", "summary": "ORACLE OVMSA-2021-0035 vom 2021-10-12", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4140 vom 2021-11-10", "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4356 vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-004 vom 2022-01-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-004.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-002 vom 2022-01-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-002.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5299-1 vom 2022-02-22", "url": "https://ubuntu.com/security/notices/USN-5299-1" }, { "category": "external", "summary": "FreeBSD Security Advisory FREEBSD-SA-22:02.WIFI vom 2022-03-15", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-22:02.wifi.asc" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5343-1 vom 2022-03-22", "url": "https://ubuntu.com/security/notices/USN-5343-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9999 vom 2022-11-16", "url": "http://linux.oracle.com/errata/ELSA-2022-9999.html" }, { "category": "external", "summary": "HP Security Bulletin HPSBPI03763 vom 2022-12-15", "url": "https://support.hp.com/de-de/document/ish_5610341-5610907-16/HPSBPI03763" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0394-1 vom 2023-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0433-1 vom 2023-02-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" } ], "source_lang": "en-US", "title": "IEEE 802.11 (WLAN): Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-07-11T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:03:34.512+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-2069", "initial_release_date": "2021-05-11T22:00:00.000+00:00", "revision_history": [ { "date": "2021-05-11T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-05-13T22:00:00.000+00:00", "number": "2", "summary": "Neue Informationen von Zyxel aufgenommen" }, { "date": "2021-05-16T22:00:00.000+00:00", "number": "3", "summary": "Produktzuordnung bzgl. Arista korrigiert" }, { "date": "2021-06-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-06-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-06-15T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-06-22T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Debian und Ubuntu aufgenommen" }, { "date": "2021-06-27T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von HP und Ubuntu aufgenommen" }, { "date": "2021-06-30T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-07-13T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-07-14T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-07-20T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2021-07-21T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-07-22T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-08-09T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-09-20T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-09-22T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux und ORACLE aufgenommen" }, { "date": "2021-10-10T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-10-11T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2021-11-09T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-30T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-02-21T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-03-15T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von FreeBSD aufgenommen" }, { "date": "2022-03-22T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-11-16T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-12-14T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-02-13T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-02-15T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-02T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-07-11T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "30" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "AVM FRITZ!Box", "product": { "name": "AVM FRITZ!Box", "product_id": "T002543", "product_identification_helper": { "cpe": "cpe:/o:avm:fritzos:-" } } } ], "category": "vendor", "name": "AVM" }, { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Apple iOS", "product": { "name": "Apple iOS", "product_id": "T005205", "product_identification_helper": { "cpe": "cpe:/o:apple:iphone_os:-" } } }, { "category": "product_name", "name": "Apple iPadOS", "product": { "name": "Apple iPadOS", "product_id": "T016605", "product_identification_helper": { "cpe": "cpe:/o:apple:ipados:-" } } }, { "category": "product_name", "name": "Apple macOS", "product": { "name": "Apple macOS", "product_id": "697", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:-" } } } ], "category": "vendor", "name": "Apple" }, { "branches": [ { "category": "product_name", "name": "Arista WiFi Access Point", "product": { "name": "Arista WiFi Access Point", "product_id": "T019358", "product_identification_helper": { "cpe": "cpe:/h:arista:wifi_access_point:-" } } } ], "category": "vendor", "name": "Arista" }, { "branches": [ { "category": "product_name", "name": "Aruba ArubaOS", "product": { "name": "Aruba ArubaOS", "product_id": "T016785", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:-" } } } ], "category": "vendor", "name": "Aruba" }, { "branches": [ { "category": "product_name", "name": "Cisco Aironet Access Point", "product": { "name": "Cisco Aironet Access Point", "product_id": "T012215", "product_identification_helper": { "cpe": "cpe:/o:cisco:aironet_access_point_software:-" } } }, { "category": "product_name", "name": "Cisco Catalyst", "product": { "name": "Cisco Catalyst", "product_id": "T000491", "product_identification_helper": { "cpe": "cpe:/h:cisco:catalyst:-" } } }, { "category": "product_name", "name": "Cisco IP Phone", "product": { "name": "Cisco IP Phone", "product_id": "2070", "product_identification_helper": { "cpe": "cpe:/h:cisco:ip_phone:-" } } }, { "branches": [ { "category": "product_name", "name": "Cisco WebEx Wireless Phone", "product": { "name": "Cisco WebEx Wireless Phone", "product_id": "T018746", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:wireless_phone" } } }, { "category": "product_name", "name": "Cisco WebEx Desk Series", "product": { "name": "Cisco WebEx Desk Series", "product_id": "T019302", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:desk_series" } } }, { "category": "product_name", "name": "Cisco WebEx Room Series", "product": { "name": "Cisco WebEx Room Series", "product_id": "T019303", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:room_series" } } }, { "category": "product_name", "name": "Cisco WebEx Board Series", "product": { "name": "Cisco WebEx Board Series", "product_id": "T019304", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:board_series" } } } ], "category": "product_name", "name": "WebEx" }, { "category": "product_name", "name": "Cisco Wireless IP Phone", "product": { "name": "Cisco Wireless IP Phone", "product_id": "T015978", "product_identification_helper": { "cpe": "cpe:/h:cisco:wireless_ip_phone:8821" } } } ], "category": "vendor", "name": "Cisco" }, { "branches": [ { "category": "product_name", "name": "D-LINK Router", "product": { "name": "D-LINK Router", "product_id": "T009493", "product_identification_helper": { "cpe": "cpe:/h:d-link:router:-" } } } ], "category": "vendor", "name": "D-LINK" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T006498", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "category": "product_name", "name": "Google Android", "product": { "name": "Google Android", "product_id": "132177", "product_identification_helper": { "cpe": "cpe:/o:google:android:-" } } } ], "category": "vendor", "name": "Google" }, { "branches": [ { "category": "product_name", "name": "HP LaserJet", "product": { "name": "HP LaserJet", "product_id": "T000052", "product_identification_helper": { "cpe": "cpe:/h:hp:laserjet:p3015" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "Intel PROSet Wireless WiFi Software", "product": { "name": "Intel PROSet Wireless WiFi Software", "product_id": "T015357", "product_identification_helper": { "cpe": "cpe:/a:intel:proset_wireless:-" } } } ], "category": "vendor", "name": "Intel" }, { "branches": [ { "category": "product_name", "name": "Juniper SRX Series", "product": { "name": "Juniper SRX Series", "product_id": "T008011", "product_identification_helper": { "cpe": "cpe:/h:juniper:srx_service_gateways:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "LANCOM Router", "product": { "name": "LANCOM Router", "product_id": "T019305", "product_identification_helper": { "cpe": "cpe:/h:lancom:router:-" } } } ], "category": "vendor", "name": "LANCOM" }, { "branches": [ { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T006520", "product_identification_helper": { "cpe": "cpe:/o:lenovo:lenovo_computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows", "product": { "name": "Microsoft Windows", "product_id": "7107", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows:-" } } } ], "category": "vendor", "name": "Microsoft" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "6368", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Specification WPA2", "product": { "name": "Specification WPA2", "product_id": "T010954", "product_identification_helper": { "cpe": "cpe:/h:ieee:wpa2:-" } } } ], "category": "vendor", "name": "Specification" }, { "branches": [ { "category": "product_name", "name": "Synology NAS", "product": { "name": "Synology NAS", "product_id": "T016423", "product_identification_helper": { "cpe": "cpe:/h:synology:nas:-" } } } ], "category": "vendor", "name": "Synology" }, { "branches": [ { "category": "product_name", "name": "Telekom Speedport", "product": { "name": "Telekom Speedport", "product_id": "T019316", "product_identification_helper": { "cpe": "cpe:/h:telekom:speedport:-" } } } ], "category": "vendor", "name": "Telekom" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "category": "product_name", "name": "Zyxel Firewall", "product": { "name": "Zyxel Firewall", "product_id": "T019338", "product_identification_helper": { "cpe": "cpe:/h:zyxel:firewall:-" } } } ], "category": "vendor", "name": "Zyxel" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-11264", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-11264" }, { "cve": "CVE-2020-11301", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-11301" }, { "cve": "CVE-2020-24586", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-24588" }, { "cve": "CVE-2020-26139", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26139" }, { "cve": "CVE-2020-26140", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26140" }, { "cve": "CVE-2020-26141", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26141" }, { "cve": "CVE-2020-26142", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26142" }, { "cve": "CVE-2020-26143", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26143" }, { "cve": "CVE-2020-26144", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26144" }, { "cve": "CVE-2020-26145", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26145" }, { "cve": "CVE-2020-26146", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26146" }, { "cve": "CVE-2020-26147", "notes": [ { "category": "description", "text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation." } ], "product_status": { "known_affected": [ "2070", "T006498", "T010954", "132177", "67646", "4035", "T005205", "T012215", "T004914", "T019358", "697", "T019316", "T019338", "T018746", "398363", "T000052", "T008011", "T000491", "T006520", "T015978", "T016605", "6368", "T015357", "T016423", "T016785", "T019302", "T019304", "T019303", "2951", "T002207", "T019305", "T000126", "7107", "T002543", "T009493" ] }, "release_date": "2021-05-11T22:00:00Z", "title": "CVE-2020-26147" } ] }
cisco-sa-wifi-faf-22epcEWu
Vulnerability from csaf_cisco
Published
2021-05-11 18:00
Modified
2021-12-15 15:47
Summary
Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
Notes
Summary
On May 11, 2021, the research paper Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation was made public. This paper discusses 12 vulnerabilities in the 802.11 standard. One vulnerability is in the frame aggregation functionality, two vulnerabilities are in the frame fragmentation functionality, and the other nine are implementation vulnerabilities. These vulnerabilities could allow an attacker to forge encrypted frames, which could in turn enable the exfiltration of sensitive data from a targeted device.
This advisory will be updated as additional information becomes available.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"]
Affected Products
Cisco is investigating its product line to determine which products may be affected by these vulnerabilities. As the investigation progresses, Cisco will update this advisory with information about affected products.
Vulnerable Products
The following table lists Cisco products that are affected by the vulnerabilities that are described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.
CVE ID Cisco Bug ID Fixed Release Availability ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"] Aironet 1532 APs, AP803 Integrated AP on IR829 Industrial Integrated Services Routers CVE-2020-24586 CSCvy32690 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690"] 8.5MR8
8.10MR6 CVE-2020-24587 CSCvy32690 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690"] 8.5MR8
8.10MR6 CVE-2020-24588 CSCvy32690 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690"] 8.5MR8
8.10MR6 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1542 APs, Aironet 1810 APs, Aironet 1815 APs, Aironet 1832 APs, Aironet 1842 APs, Aironet 1852 APs, Aironet 1800i APs CVE-2020-24586 Not affected N/A CVE-2020-24587 CSCvx24420 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24588 CSCvx24420 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26139 CSCvx24420 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 CSCvx24420 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26146 CSCvx24420 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26147 Not affected N/A Aironet 1552 APs, Aironet 1552H APs, Aironet 1572 APs, Aironet 1702 APs, Aironet 2702 APs, Aironet 3702 APs, IW 3702 APs CVE-2020-24586 CSCvy32680 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680"] 8.5MR8
8.10MR6
16.12.6
17.3.4 CVE-2020-24587 CSCvy32680 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680"] 8.5MR8
8.10MR6
16.12.6
17.3.4 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1560 Series APs, Aironet 2800 Series APs, Aironet Series 3800 APs, Aironet Series 4800 APs, Catalyst IW 6300 APs, 6300 Series Embedded Services APs (ESW6300) CVE-2020-24586 CSCvx24449 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24587 CSCvx24449 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 CSCvy36698 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 CSCvy36698 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 CSCvy36698 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26147 CSCvy36698 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 Catalyst 9105 APs, Catalyst 9115 APs, Catalyst 9120 APs, Integrated AP on 1100 Integrated Services Routers CVE-2020-24586 CSCvx24425 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24587 CSCvx24425 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24588 CSCvx24425 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Catalyst 9117 APs CVE-2020-24586 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24587 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24588 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26139 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26145 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26146 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26147 Not affected N/A Catalyst 9124 APs1, Catalyst 9130 APs CVE-2020-24586 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24587 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24588 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26139 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26145 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26146 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26147 Not affected N/A 1. Catalyst 9124 APs were not supported until Release 17.5, and the fix will be available in Release 17.6.1 Meraki GR10, GR60, MR20, MR30H, MR33, MR36, MR42, MR42E, MR44, MR45, MR46, MR46E, MR52, MR53, MR53E, MR55, MR56, MR70, MR74, MR76, MR84, MR86 CVE-2020-24586 No bug ID MR 27.7.1 CVE-2020-24587 No bug ID MR 27.7.1 CVE-2020-24588 No bug ID MR 27.7.1 CVE-2020-26139 No bug ID MR 27.7.1 CVE-2020-26140 No bug ID MR 27.7.1 CVE-2020-26141 No bug ID MR 27.7.1 CVE-2020-26142 No bug ID MR 27.7.1 CVE-2020-26143 No bug ID MR 27.7.1 CVE-2020-26144 No bug ID MR 27.7.1 CVE-2020-26145 No bug ID MR 27.7.1 CVE-2020-26146 No bug ID MR 27.7.1 CVE-2020-26147 No bug ID MR 27.7.1 Meraki MR12, MR18, MR26, MR32, MR34, MR62, MR66, MR72 CVE-2020-24586 No bug ID MR 26.8.3 CVE-2020-24587 No bug ID MR 26.8.3 CVE-2020-24588 No bug ID MR 26.8.3 CVE-2020-26139 No bug ID MR 26.8.3 CVE-2020-26140 No bug ID MR 26.8.3 CVE-2020-26141 No bug ID MR 26.8.3 CVE-2020-26142 No bug ID MR 26.8.3 CVE-2020-26143 No bug ID MR 26.8.3 CVE-2020-26144 No bug ID MR 26.8.3 CVE-2020-26145 No bug ID MR 26.8.3 CVE-2020-26146 No bug ID MR 26.8.3 CVE-2020-26147 No bug ID MR 26.8.3 Meraki MX64W, MX65W, MX67W, MX67CW, MX68W, MX68CW, Z3, Z3C1 CVE-2020-24586 No bug ID MX 17.0 CVE-2020-24587 No bug ID MX 17.0 CVE-2020-24588 No bug ID MX 17.0 CVE-2020-26139 No bug ID MX 17.0 CVE-2020-26140 No bug ID MX 17.0 CVE-2020-26141 No bug ID MX 17.0 CVE-2020-26142 No bug ID MX 17.0 CVE-2020-26143 No bug ID MX 17.0 CVE-2020-26144 No bug ID MX 17.0 CVE-2020-26145 No bug ID MX 17.0 CVE-2020-26146 No bug ID MX 17.0 CVE-2020-26147 No bug ID MX 17.0 1. Cisco will not fix these vulnerabilities in the following Cisco Meraki products: MX60W and Z1 IP Phone 8861, IP Phone 8865, and IP Conference Phone 8832 CVE-2020-24586 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-24587 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-24588 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26139 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26140 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26141 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26142 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26143 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26144 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26145 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26146 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26147 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) IP Phone 6861 and IP Phone 8861 Running Third-Party Call Control (3PCC) Software CVE-2020-24586 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-24587 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-24588 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26139 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26140 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26141 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26142 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26143 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26144 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26145 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26146 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26147 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) Wireless IP Phone 8821 CVE-2020-24586 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-24587 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-24588 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26139 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26140 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26141 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26142 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26143 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26144 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26145 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26146 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26147 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 Webex Desk Series and Webex Room Series CVE-2020-24586 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-24587 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-24588 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26139 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26140 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26141 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26142 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26143 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26144 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26145 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26146 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26147 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 Webex Board Series CVE-2020-24586 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-24587 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-24588 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26139 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26140 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26141 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26142 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26143 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26144 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26145 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26146 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26147 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 Webex Wireless Phone 840 and 860 CVE-2020-24586 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-24587 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-24588 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26139 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26140 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26141 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26142 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26143 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26144 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26145 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26146 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26147 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0)
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability.
Details
The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.
For a description of the following vulnerabilities, see Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation ["https://papers.mathyvanhoef.com/usenix2021.pdf"].
For additional information, see FragAttacks ["https://fragattacks.com/"].
CVE-2020-26140: Accepting plaintext data frames in a protected network
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2020-26143: Accepting fragmented plaintext data frames in a protected network
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2020-26144: Accepting plaintext A-MSDU frames that start with an RFC1042 header with EtherType EAPOL (in an encrypted network)
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2020-26145: Accepting plaintext broadcast fragments as full frames (in an encrypted network)
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2020-24586: Not clearing fragments from memory when (re)connecting to a network
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-24588: Accepting non-SPP A-MSDU frames
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-26139: Forwarding EAPOL frames even though the sender is not yet authenticated
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2020-26141: Not verifying the TKIP MIC of fragmented frames
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-26142: Processing fragmented frames as full frames
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-24587: Reassembling fragments encrypted under different keys
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.8
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-26146: Reassembling encrypted fragments with non-consecutive packet numbers
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.8
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-26147: Reassembling mixed encrypted/plaintext fragments
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.8
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Workarounds
There are no workarounds that address these vulnerabilities.
Fixed Software
For information about fixed software releases ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], consult the Cisco bugs identified in the Vulnerable Products ["#vp"] section of this advisory.
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.
The Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.
Source
These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his continued help and support during the handling of these vulnerabilities.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
{ "document": { "acknowledgments": [ { "summary": "These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his continued help and support during the handling of these vulnerabilities." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "On May 11, 2021, the research paper Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation was made public. This paper discusses 12 vulnerabilities in the 802.11 standard. One vulnerability is in the frame aggregation functionality, two vulnerabilities are in the frame fragmentation functionality, and the other nine are implementation vulnerabilities. These vulnerabilities could allow an attacker to forge encrypted frames, which could in turn enable the exfiltration of sensitive data from a targeted device.\r\n\r\nThis advisory will be updated as additional information becomes available.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu\"]", "title": "Summary" }, { "category": "general", "text": "Cisco is investigating its product line to determine which products may be affected by these vulnerabilities. As the investigation progresses, Cisco will update this advisory with information about affected products.", "title": "Affected Products" }, { "category": "general", "text": "The following table lists Cisco products that are affected by the vulnerabilities that are described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.\r\n CVE ID Cisco Bug ID Fixed Release Availability [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] Aironet 1532 APs, AP803 Integrated AP on IR829 Industrial Integrated Services Routers CVE-2020-24586 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-24587 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-24588 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1542 APs, Aironet 1810 APs, Aironet 1815 APs, Aironet 1832 APs, Aironet 1842 APs, Aironet 1852 APs, Aironet 1800i APs CVE-2020-24586 Not affected N/A CVE-2020-24587 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A Aironet 1552 APs, Aironet 1552H APs, Aironet 1572 APs, Aironet 1702 APs, Aironet 2702 APs, Aironet 3702 APs, IW 3702 APs CVE-2020-24586 CSCvy32680 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4 CVE-2020-24587 CSCvy32680 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1560 Series APs, Aironet 2800 Series APs, Aironet Series 3800 APs, Aironet Series 4800 APs, Catalyst IW 6300 APs, 6300 Series Embedded Services APs (ESW6300) CVE-2020-24586 CSCvx24449 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24449 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 Catalyst 9105 APs, Catalyst 9115 APs, Catalyst 9120 APs, Integrated AP on 1100 Integrated Services Routers CVE-2020-24586 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Catalyst 9117 APs CVE-2020-24586 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26145 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A Catalyst 9124 APs1, Catalyst 9130 APs CVE-2020-24586 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26145 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A 1. Catalyst 9124 APs were not supported until Release 17.5, and the fix will be available in Release 17.6.1 Meraki GR10, GR60, MR20, MR30H, MR33, MR36, MR42, MR42E, MR44, MR45, MR46, MR46E, MR52, MR53, MR53E, MR55, MR56, MR70, MR74, MR76, MR84, MR86 CVE-2020-24586 No bug ID MR 27.7.1 CVE-2020-24587 No bug ID MR 27.7.1 CVE-2020-24588 No bug ID MR 27.7.1 CVE-2020-26139 No bug ID MR 27.7.1 CVE-2020-26140 No bug ID MR 27.7.1 CVE-2020-26141 No bug ID MR 27.7.1 CVE-2020-26142 No bug ID MR 27.7.1 CVE-2020-26143 No bug ID MR 27.7.1 CVE-2020-26144 No bug ID MR 27.7.1 CVE-2020-26145 No bug ID MR 27.7.1 CVE-2020-26146 No bug ID MR 27.7.1 CVE-2020-26147 No bug ID MR 27.7.1 Meraki MR12, MR18, MR26, MR32, MR34, MR62, MR66, MR72 CVE-2020-24586 No bug ID MR 26.8.3 CVE-2020-24587 No bug ID MR 26.8.3 CVE-2020-24588 No bug ID MR 26.8.3 CVE-2020-26139 No bug ID MR 26.8.3 CVE-2020-26140 No bug ID MR 26.8.3 CVE-2020-26141 No bug ID MR 26.8.3 CVE-2020-26142 No bug ID MR 26.8.3 CVE-2020-26143 No bug ID MR 26.8.3 CVE-2020-26144 No bug ID MR 26.8.3 CVE-2020-26145 No bug ID MR 26.8.3 CVE-2020-26146 No bug ID MR 26.8.3 CVE-2020-26147 No bug ID MR 26.8.3 Meraki MX64W, MX65W, MX67W, MX67CW, MX68W, MX68CW, Z3, Z3C1 CVE-2020-24586 No bug ID MX 17.0 CVE-2020-24587 No bug ID MX 17.0 CVE-2020-24588 No bug ID MX 17.0 CVE-2020-26139 No bug ID MX 17.0 CVE-2020-26140 No bug ID MX 17.0 CVE-2020-26141 No bug ID MX 17.0 CVE-2020-26142 No bug ID MX 17.0 CVE-2020-26143 No bug ID MX 17.0 CVE-2020-26144 No bug ID MX 17.0 CVE-2020-26145 No bug ID MX 17.0 CVE-2020-26146 No bug ID MX 17.0 CVE-2020-26147 No bug ID MX 17.0 1. Cisco will not fix these vulnerabilities in the following Cisco Meraki products: MX60W and Z1 IP Phone 8861, IP Phone 8865, and IP Conference Phone 8832 CVE-2020-24586 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-24587 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-24588 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26139 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26140 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26141 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26142 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26143 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26144 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26145 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26146 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26147 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) IP Phone 6861 and IP Phone 8861 Running Third-Party Call Control (3PCC) Software CVE-2020-24586 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-24587 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-24588 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26139 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26140 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26141 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26142 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26143 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26144 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26145 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26146 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26147 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) Wireless IP Phone 8821 CVE-2020-24586 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-24587 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-24588 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26139 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26140 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26141 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26142 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26143 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26144 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26145 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26146 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26147 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 Webex Desk Series and Webex Room Series CVE-2020-24586 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-24587 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-24588 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26139 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26140 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26141 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26142 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26143 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26144 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26145 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26146 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26147 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 Webex Board Series CVE-2020-24586 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-24587 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-24588 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26139 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26140 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26141 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26142 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26143 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26144 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26145 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26146 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26147 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 Webex Wireless Phone 840 and 860 CVE-2020-24586 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-24587 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-24588 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26139 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26140 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26141 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26142 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26143 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26144 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26145 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26146 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26147 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0)", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.\r\n\r\nFor a description of the following vulnerabilities, see Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation [\"https://papers.mathyvanhoef.com/usenix2021.pdf\"].\r\n\r\nFor additional information, see FragAttacks [\"https://fragattacks.com/\"].\r\n\r\nCVE-2020-26140: Accepting plaintext data frames in a protected network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26143: Accepting fragmented plaintext data frames in a protected network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26144: Accepting plaintext A-MSDU frames that start with an RFC1042 header with EtherType EAPOL (in an encrypted network)\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26145: Accepting plaintext broadcast fragments as full frames (in an encrypted network)\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24586: Not clearing fragments from memory when (re)connecting to a network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24588: Accepting non-SPP A-MSDU frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26139: Forwarding EAPOL frames even though the sender is not yet authenticated\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\r\n\r\nCVE-2020-26141: Not verifying the TKIP MIC of fragmented frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26142: Processing fragmented frames as full frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24587: Reassembling fragments encrypted under different keys\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26146: Reassembling encrypted fragments with non-consecutive packet numbers\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26147: Reassembling mixed encrypted/plaintext fragments\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "title": "Details" }, { "category": "general", "text": "There are no workarounds that address these vulnerabilities.", "title": "Workarounds" }, { "category": "general", "text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his continued help and support during the handling of these vulnerabilities.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.", "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "category": "external", "summary": "Fixed Release Availability", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "CSCvy32690", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690" }, { "category": "external", "summary": "CSCvy32690", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690" }, { "category": "external", "summary": "CSCvy32690", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690" }, { "category": "external", "summary": "CSCvx24420", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420" }, { "category": "external", "summary": "CSCvx24420", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420" }, { "category": "external", "summary": "CSCvx24420", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420" }, { "category": "external", "summary": "CSCvx24420", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420" }, { "category": "external", "summary": "CSCvx24420", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420" }, { "category": "external", "summary": "CSCvy32680", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680" }, { "category": "external", "summary": "CSCvy32680", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680" }, { "category": "external", "summary": "CSCvx24449", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449" }, { "category": "external", "summary": "CSCvx24449", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449" }, { "category": "external", "summary": "CSCvy36698", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698" }, { "category": "external", "summary": "CSCvy36698", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698" }, { "category": "external", "summary": "CSCvy36698", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698" }, { "category": "external", "summary": "CSCvy36698", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698" }, { "category": "external", "summary": "CSCvx24425", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425" }, { "category": "external", "summary": "CSCvx24425", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425" }, { "category": "external", "summary": "CSCvx24425", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation", "url": "https://papers.mathyvanhoef.com/usenix2021.pdf" }, { "category": "external", "summary": "FragAttacks", "url": "https://fragattacks.com/" }, { "category": "external", "summary": "fixed software releases", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco\u0026nbsp;Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" } ], "title": "Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tracking": { "current_release_date": "2021-12-15T15:47:26+00:00", "generator": { "date": "2022-09-03T03:38:26+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-wifi-faf-22epcEWu", "initial_release_date": "2021-05-11T18:00:00+00:00", "revision_history": [ { "date": "2021-05-10T16:33:53+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2021-05-11T21:59:40+00:00", "number": "1.1.0", "summary": "Updated affected Meraki MR products." }, { "date": "2021-05-14T20:43:24+00:00", "number": "1.2.0", "summary": "Added additional affected products." }, { "date": "2021-05-17T17:42:47+00:00", "number": "1.3.0", "summary": "Added additional affected products." }, { "date": "2021-05-19T20:50:42+00:00", "number": "1.4.0", "summary": "Added additional fixed releases." }, { "date": "2021-06-02T20:48:21+00:00", "number": "1.5.0", "summary": "Update affected products." }, { "date": "2021-07-13T18:42:53+00:00", "number": "1.6.0", "summary": "Added additional fixed releases for Meraki products." }, { "date": "2021-08-30T19:06:07+00:00", "number": "1.7.0", "summary": "Updated fixed release details for multiple products." }, { "date": "2021-10-05T14:54:59+00:00", "number": "1.8.0", "summary": "Updated fixed release details for Aironet 1532/AP803 products." }, { "date": "2021-12-15T15:47:26+00:00", "number": "1.9.0", "summary": "Updated fixed releases." } ], "status": "final", "version": "1.9.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco Aironet Access Point Software", "product": { "name": "Cisco Aironet Access Point Software ", "product_id": "CSAFPID-190024" } }, { "category": "product_family", "name": "Cisco IP Phones with Multiplatform Firmware", "product": { "name": "Cisco IP Phones with Multiplatform Firmware ", "product_id": "CSAFPID-277607" } }, { "category": "product_family", "name": "Cisco TelePresence Endpoint Software (TC/CE)", "product": { "name": "Cisco TelePresence Endpoint Software (TC/CE) ", "product_id": "CSAFPID-278404" } }, { "category": "product_family", "name": "Cisco Webex Room Phone", "product": { "name": "Cisco Webex Room Phone ", "product_id": "CSAFPID-278888" } }, { "category": "product_family", "name": "Cisco Business Wireless Access Point Software", "product": { "name": "Cisco Business Wireless Access Point Software ", "product_id": "CSAFPID-280012" } }, { "category": "product_family", "name": "Cisco Aironet Access Point Software (IOS XE Controller)", "product": { "name": "Cisco Aironet Access Point Software (IOS XE Controller) ", "product_id": "CSAFPID-280019" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-26144", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-280019", "CSAFPID-190024", "CSAFPID-280012" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-26144" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-277607" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-26141" }, { "cve": "CVE-2020-26146", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx24420" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24425" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24441" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24440" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24449" }, { "system_name": "Cisco Bug ID", "text": "CSCvy32694" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-190024", "CSAFPID-277607", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-278404", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-190024", "CSAFPID-277607", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-278404" ] } ], "title": "vuln-CVE-2020-26146" }, { "cve": "CVE-2020-26147", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-277607" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-26147" }, { "cve": "CVE-2020-26140", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-277607" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-26140" }, { "cve": "CVE-2020-26142", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-277607" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-26142" }, { "cve": "CVE-2020-26143", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-277607" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404" ] } ], "title": "vuln-CVE-2020-26143" }, { "cve": "CVE-2020-26145", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24420" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404" ] } ], "title": "vuln-CVE-2020-26145" }, { "cve": "CVE-2020-26139", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24420" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404" ] } ], "title": "vuln-CVE-2020-26139" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24420" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24425" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24449" }, { "system_name": "Cisco Bug ID", "text": "CSCvy32680" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-280012", "CSAFPID-190024", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-24587" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24425" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24441" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24449" }, { "system_name": "Cisco Bug ID", "text": "CSCvy32680" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx60997" }, { "system_name": "Cisco Bug ID", "text": "CSCvx61001" }, { "system_name": "Cisco Bug ID", "text": "CSCvx61012" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx61020" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-280012", "CSAFPID-190024", "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-280012", "CSAFPID-190024", "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-24586" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx24420" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24425" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24423" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" }, { "system_name": "Cisco Bug ID", "text": "CSCvy32690" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-24588" } ] }
cisco-sa-wifi-faf-22epcewu
Vulnerability from csaf_cisco
Published
2021-05-11 18:00
Modified
2021-12-15 15:47
Summary
Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
Notes
Summary
On May 11, 2021, the research paper Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation was made public. This paper discusses 12 vulnerabilities in the 802.11 standard. One vulnerability is in the frame aggregation functionality, two vulnerabilities are in the frame fragmentation functionality, and the other nine are implementation vulnerabilities. These vulnerabilities could allow an attacker to forge encrypted frames, which could in turn enable the exfiltration of sensitive data from a targeted device.
This advisory will be updated as additional information becomes available.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"]
Affected Products
Cisco is investigating its product line to determine which products may be affected by these vulnerabilities. As the investigation progresses, Cisco will update this advisory with information about affected products.
Vulnerable Products
The following table lists Cisco products that are affected by the vulnerabilities that are described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.
CVE ID Cisco Bug ID Fixed Release Availability ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"] Aironet 1532 APs, AP803 Integrated AP on IR829 Industrial Integrated Services Routers CVE-2020-24586 CSCvy32690 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690"] 8.5MR8
8.10MR6 CVE-2020-24587 CSCvy32690 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690"] 8.5MR8
8.10MR6 CVE-2020-24588 CSCvy32690 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690"] 8.5MR8
8.10MR6 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1542 APs, Aironet 1810 APs, Aironet 1815 APs, Aironet 1832 APs, Aironet 1842 APs, Aironet 1852 APs, Aironet 1800i APs CVE-2020-24586 Not affected N/A CVE-2020-24587 CSCvx24420 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24588 CSCvx24420 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26139 CSCvx24420 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 CSCvx24420 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26146 CSCvx24420 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26147 Not affected N/A Aironet 1552 APs, Aironet 1552H APs, Aironet 1572 APs, Aironet 1702 APs, Aironet 2702 APs, Aironet 3702 APs, IW 3702 APs CVE-2020-24586 CSCvy32680 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680"] 8.5MR8
8.10MR6
16.12.6
17.3.4 CVE-2020-24587 CSCvy32680 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680"] 8.5MR8
8.10MR6
16.12.6
17.3.4 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1560 Series APs, Aironet 2800 Series APs, Aironet Series 3800 APs, Aironet Series 4800 APs, Catalyst IW 6300 APs, 6300 Series Embedded Services APs (ESW6300) CVE-2020-24586 CSCvx24449 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24587 CSCvx24449 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 CSCvy36698 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 CSCvy36698 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 CSCvy36698 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26147 CSCvy36698 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698"] 8.5MR8
8.10MR6
16.12.6
17.3.4
17.6.1 Catalyst 9105 APs, Catalyst 9115 APs, Catalyst 9120 APs, Integrated AP on 1100 Integrated Services Routers CVE-2020-24586 CSCvx24425 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24587 CSCvx24425 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24588 CSCvx24425 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Catalyst 9117 APs CVE-2020-24586 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24587 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24588 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26139 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26145 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26146 CSCvx24439 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26147 Not affected N/A Catalyst 9124 APs1, Catalyst 9130 APs CVE-2020-24586 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24587 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-24588 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26139 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26145 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26146 CSCvx24428 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"]
CSCvx24452 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"]
CSCvx24456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"] 8.10MR6
16.12.6
17.3.4
17.6.1 CVE-2020-26147 Not affected N/A 1. Catalyst 9124 APs were not supported until Release 17.5, and the fix will be available in Release 17.6.1 Meraki GR10, GR60, MR20, MR30H, MR33, MR36, MR42, MR42E, MR44, MR45, MR46, MR46E, MR52, MR53, MR53E, MR55, MR56, MR70, MR74, MR76, MR84, MR86 CVE-2020-24586 No bug ID MR 27.7.1 CVE-2020-24587 No bug ID MR 27.7.1 CVE-2020-24588 No bug ID MR 27.7.1 CVE-2020-26139 No bug ID MR 27.7.1 CVE-2020-26140 No bug ID MR 27.7.1 CVE-2020-26141 No bug ID MR 27.7.1 CVE-2020-26142 No bug ID MR 27.7.1 CVE-2020-26143 No bug ID MR 27.7.1 CVE-2020-26144 No bug ID MR 27.7.1 CVE-2020-26145 No bug ID MR 27.7.1 CVE-2020-26146 No bug ID MR 27.7.1 CVE-2020-26147 No bug ID MR 27.7.1 Meraki MR12, MR18, MR26, MR32, MR34, MR62, MR66, MR72 CVE-2020-24586 No bug ID MR 26.8.3 CVE-2020-24587 No bug ID MR 26.8.3 CVE-2020-24588 No bug ID MR 26.8.3 CVE-2020-26139 No bug ID MR 26.8.3 CVE-2020-26140 No bug ID MR 26.8.3 CVE-2020-26141 No bug ID MR 26.8.3 CVE-2020-26142 No bug ID MR 26.8.3 CVE-2020-26143 No bug ID MR 26.8.3 CVE-2020-26144 No bug ID MR 26.8.3 CVE-2020-26145 No bug ID MR 26.8.3 CVE-2020-26146 No bug ID MR 26.8.3 CVE-2020-26147 No bug ID MR 26.8.3 Meraki MX64W, MX65W, MX67W, MX67CW, MX68W, MX68CW, Z3, Z3C1 CVE-2020-24586 No bug ID MX 17.0 CVE-2020-24587 No bug ID MX 17.0 CVE-2020-24588 No bug ID MX 17.0 CVE-2020-26139 No bug ID MX 17.0 CVE-2020-26140 No bug ID MX 17.0 CVE-2020-26141 No bug ID MX 17.0 CVE-2020-26142 No bug ID MX 17.0 CVE-2020-26143 No bug ID MX 17.0 CVE-2020-26144 No bug ID MX 17.0 CVE-2020-26145 No bug ID MX 17.0 CVE-2020-26146 No bug ID MX 17.0 CVE-2020-26147 No bug ID MX 17.0 1. Cisco will not fix these vulnerabilities in the following Cisco Meraki products: MX60W and Z1 IP Phone 8861, IP Phone 8865, and IP Conference Phone 8832 CVE-2020-24586 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-24587 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-24588 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26139 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26140 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26141 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26142 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26143 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26144 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26145 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26146 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) CVE-2020-26147 CSCvx60997 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"] 14.1(1) IP Phone 6861 and IP Phone 8861 Running Third-Party Call Control (3PCC) Software CVE-2020-24586 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-24587 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-24588 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26139 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26140 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26141 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26142 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26143 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26144 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26145 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26146 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) CVE-2020-26147 CSCvx61001 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"] 11.3(5) Wireless IP Phone 8821 CVE-2020-24586 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-24587 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-24588 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26139 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26140 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26141 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26142 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26143 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26144 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26145 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26146 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 CVE-2020-26147 CSCvx61012 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"] 11.0(6)SR2 Webex Desk Series and Webex Room Series CVE-2020-24586 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-24587 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-24588 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26139 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26140 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26141 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26142 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26143 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26144 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26145 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26146 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 CVE-2020-26147 CSCvx89821 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"] 1.2(0)SR1 Webex Board Series CVE-2020-24586 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-24587 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-24588 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26139 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26140 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26141 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26142 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26143 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26144 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26145 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26146 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 CVE-2020-26147 CSCvx61020 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"] 10.8.2.5 Webex Wireless Phone 840 and 860 CVE-2020-24586 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-24587 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-24588 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26139 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26140 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26141 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26142 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26143 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26144 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26145 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26146 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0) CVE-2020-26147 CSCvx62886 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"] 1.4(0)
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability.
Details
The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.
For a description of the following vulnerabilities, see Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation ["https://papers.mathyvanhoef.com/usenix2021.pdf"].
For additional information, see FragAttacks ["https://fragattacks.com/"].
CVE-2020-26140: Accepting plaintext data frames in a protected network
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2020-26143: Accepting fragmented plaintext data frames in a protected network
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2020-26144: Accepting plaintext A-MSDU frames that start with an RFC1042 header with EtherType EAPOL (in an encrypted network)
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2020-26145: Accepting plaintext broadcast fragments as full frames (in an encrypted network)
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2020-24586: Not clearing fragments from memory when (re)connecting to a network
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-24588: Accepting non-SPP A-MSDU frames
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-26139: Forwarding EAPOL frames even though the sender is not yet authenticated
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2020-26141: Not verifying the TKIP MIC of fragmented frames
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-26142: Processing fragmented frames as full frames
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-24587: Reassembling fragments encrypted under different keys
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.8
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-26146: Reassembling encrypted fragments with non-consecutive packet numbers
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.8
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2020-26147: Reassembling mixed encrypted/plaintext fragments
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.8
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Workarounds
There are no workarounds that address these vulnerabilities.
Fixed Software
For information about fixed software releases ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], consult the Cisco bugs identified in the Vulnerable Products ["#vp"] section of this advisory.
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.
The Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.
Source
These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his continued help and support during the handling of these vulnerabilities.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
{ "document": { "acknowledgments": [ { "summary": "These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his continued help and support during the handling of these vulnerabilities." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "On May 11, 2021, the research paper Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation was made public. This paper discusses 12 vulnerabilities in the 802.11 standard. One vulnerability is in the frame aggregation functionality, two vulnerabilities are in the frame fragmentation functionality, and the other nine are implementation vulnerabilities. These vulnerabilities could allow an attacker to forge encrypted frames, which could in turn enable the exfiltration of sensitive data from a targeted device.\r\n\r\nThis advisory will be updated as additional information becomes available.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu\"]", "title": "Summary" }, { "category": "general", "text": "Cisco is investigating its product line to determine which products may be affected by these vulnerabilities. As the investigation progresses, Cisco will update this advisory with information about affected products.", "title": "Affected Products" }, { "category": "general", "text": "The following table lists Cisco products that are affected by the vulnerabilities that are described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.\r\n CVE ID Cisco Bug ID Fixed Release Availability [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] Aironet 1532 APs, AP803 Integrated AP on IR829 Industrial Integrated Services Routers CVE-2020-24586 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-24587 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-24588 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1542 APs, Aironet 1810 APs, Aironet 1815 APs, Aironet 1832 APs, Aironet 1842 APs, Aironet 1852 APs, Aironet 1800i APs CVE-2020-24586 Not affected N/A CVE-2020-24587 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A Aironet 1552 APs, Aironet 1552H APs, Aironet 1572 APs, Aironet 1702 APs, Aironet 2702 APs, Aironet 3702 APs, IW 3702 APs CVE-2020-24586 CSCvy32680 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4 CVE-2020-24587 CSCvy32680 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1560 Series APs, Aironet 2800 Series APs, Aironet Series 3800 APs, Aironet Series 4800 APs, Catalyst IW 6300 APs, 6300 Series Embedded Services APs (ESW6300) CVE-2020-24586 CSCvx24449 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24449 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 Catalyst 9105 APs, Catalyst 9115 APs, Catalyst 9120 APs, Integrated AP on 1100 Integrated Services Routers CVE-2020-24586 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Catalyst 9117 APs CVE-2020-24586 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26145 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A Catalyst 9124 APs1, Catalyst 9130 APs CVE-2020-24586 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26145 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A 1. Catalyst 9124 APs were not supported until Release 17.5, and the fix will be available in Release 17.6.1 Meraki GR10, GR60, MR20, MR30H, MR33, MR36, MR42, MR42E, MR44, MR45, MR46, MR46E, MR52, MR53, MR53E, MR55, MR56, MR70, MR74, MR76, MR84, MR86 CVE-2020-24586 No bug ID MR 27.7.1 CVE-2020-24587 No bug ID MR 27.7.1 CVE-2020-24588 No bug ID MR 27.7.1 CVE-2020-26139 No bug ID MR 27.7.1 CVE-2020-26140 No bug ID MR 27.7.1 CVE-2020-26141 No bug ID MR 27.7.1 CVE-2020-26142 No bug ID MR 27.7.1 CVE-2020-26143 No bug ID MR 27.7.1 CVE-2020-26144 No bug ID MR 27.7.1 CVE-2020-26145 No bug ID MR 27.7.1 CVE-2020-26146 No bug ID MR 27.7.1 CVE-2020-26147 No bug ID MR 27.7.1 Meraki MR12, MR18, MR26, MR32, MR34, MR62, MR66, MR72 CVE-2020-24586 No bug ID MR 26.8.3 CVE-2020-24587 No bug ID MR 26.8.3 CVE-2020-24588 No bug ID MR 26.8.3 CVE-2020-26139 No bug ID MR 26.8.3 CVE-2020-26140 No bug ID MR 26.8.3 CVE-2020-26141 No bug ID MR 26.8.3 CVE-2020-26142 No bug ID MR 26.8.3 CVE-2020-26143 No bug ID MR 26.8.3 CVE-2020-26144 No bug ID MR 26.8.3 CVE-2020-26145 No bug ID MR 26.8.3 CVE-2020-26146 No bug ID MR 26.8.3 CVE-2020-26147 No bug ID MR 26.8.3 Meraki MX64W, MX65W, MX67W, MX67CW, MX68W, MX68CW, Z3, Z3C1 CVE-2020-24586 No bug ID MX 17.0 CVE-2020-24587 No bug ID MX 17.0 CVE-2020-24588 No bug ID MX 17.0 CVE-2020-26139 No bug ID MX 17.0 CVE-2020-26140 No bug ID MX 17.0 CVE-2020-26141 No bug ID MX 17.0 CVE-2020-26142 No bug ID MX 17.0 CVE-2020-26143 No bug ID MX 17.0 CVE-2020-26144 No bug ID MX 17.0 CVE-2020-26145 No bug ID MX 17.0 CVE-2020-26146 No bug ID MX 17.0 CVE-2020-26147 No bug ID MX 17.0 1. Cisco will not fix these vulnerabilities in the following Cisco Meraki products: MX60W and Z1 IP Phone 8861, IP Phone 8865, and IP Conference Phone 8832 CVE-2020-24586 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-24587 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-24588 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26139 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26140 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26141 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26142 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26143 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26144 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26145 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26146 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26147 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) IP Phone 6861 and IP Phone 8861 Running Third-Party Call Control (3PCC) Software CVE-2020-24586 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-24587 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-24588 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26139 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26140 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26141 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26142 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26143 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26144 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26145 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26146 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26147 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) Wireless IP Phone 8821 CVE-2020-24586 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-24587 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-24588 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26139 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26140 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26141 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26142 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26143 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26144 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26145 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26146 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26147 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 Webex Desk Series and Webex Room Series CVE-2020-24586 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-24587 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-24588 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26139 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26140 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26141 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26142 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26143 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26144 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26145 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26146 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26147 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 Webex Board Series CVE-2020-24586 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-24587 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-24588 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26139 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26140 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26141 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26142 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26143 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26144 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26145 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26146 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26147 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 Webex Wireless Phone 840 and 860 CVE-2020-24586 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-24587 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-24588 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26139 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26140 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26141 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26142 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26143 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26144 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26145 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26146 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26147 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0)", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.\r\n\r\nFor a description of the following vulnerabilities, see Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation [\"https://papers.mathyvanhoef.com/usenix2021.pdf\"].\r\n\r\nFor additional information, see FragAttacks [\"https://fragattacks.com/\"].\r\n\r\nCVE-2020-26140: Accepting plaintext data frames in a protected network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26143: Accepting fragmented plaintext data frames in a protected network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26144: Accepting plaintext A-MSDU frames that start with an RFC1042 header with EtherType EAPOL (in an encrypted network)\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26145: Accepting plaintext broadcast fragments as full frames (in an encrypted network)\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24586: Not clearing fragments from memory when (re)connecting to a network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24588: Accepting non-SPP A-MSDU frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26139: Forwarding EAPOL frames even though the sender is not yet authenticated\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\r\n\r\nCVE-2020-26141: Not verifying the TKIP MIC of fragmented frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26142: Processing fragmented frames as full frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24587: Reassembling fragments encrypted under different keys\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26146: Reassembling encrypted fragments with non-consecutive packet numbers\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26147: Reassembling mixed encrypted/plaintext fragments\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "title": "Details" }, { "category": "general", "text": "There are no workarounds that address these vulnerabilities.", "title": "Workarounds" }, { "category": "general", "text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his continued help and support during the handling of these vulnerabilities.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.", "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "category": "external", "summary": "Fixed Release Availability", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "CSCvy32690", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690" }, { "category": "external", "summary": "CSCvy32690", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690" }, { "category": "external", "summary": "CSCvy32690", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690" }, { "category": "external", "summary": "CSCvx24420", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420" }, { "category": "external", "summary": "CSCvx24420", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420" }, { "category": "external", "summary": "CSCvx24420", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420" }, { "category": "external", "summary": "CSCvx24420", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420" }, { "category": "external", "summary": "CSCvx24420", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420" }, { "category": "external", "summary": "CSCvy32680", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680" }, { "category": "external", "summary": "CSCvy32680", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680" }, { "category": "external", "summary": "CSCvx24449", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449" }, { "category": "external", "summary": "CSCvx24449", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449" }, { "category": "external", "summary": "CSCvy36698", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698" }, { "category": "external", "summary": "CSCvy36698", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698" }, { "category": "external", "summary": "CSCvy36698", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698" }, { "category": "external", "summary": "CSCvy36698", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698" }, { "category": "external", "summary": "CSCvx24425", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425" }, { "category": "external", "summary": "CSCvx24425", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425" }, { "category": "external", "summary": "CSCvx24425", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24439", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx24428", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428" }, { "category": "external", "summary": "CSCvx24452", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452" }, { "category": "external", "summary": "CSCvx24456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx60997", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61001", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx61012", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx89821", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx61020", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "CSCvx62886", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886" }, { "category": "external", "summary": "Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation", "url": "https://papers.mathyvanhoef.com/usenix2021.pdf" }, { "category": "external", "summary": "FragAttacks", "url": "https://fragattacks.com/" }, { "category": "external", "summary": "fixed software releases", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco\u0026nbsp;Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" } ], "title": "Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tracking": { "current_release_date": "2021-12-15T15:47:26+00:00", "generator": { "date": "2022-09-03T03:38:26+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-wifi-faf-22epcEWu", "initial_release_date": "2021-05-11T18:00:00+00:00", "revision_history": [ { "date": "2021-05-10T16:33:53+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2021-05-11T21:59:40+00:00", "number": "1.1.0", "summary": "Updated affected Meraki MR products." }, { "date": "2021-05-14T20:43:24+00:00", "number": "1.2.0", "summary": "Added additional affected products." }, { "date": "2021-05-17T17:42:47+00:00", "number": "1.3.0", "summary": "Added additional affected products." }, { "date": "2021-05-19T20:50:42+00:00", "number": "1.4.0", "summary": "Added additional fixed releases." }, { "date": "2021-06-02T20:48:21+00:00", "number": "1.5.0", "summary": "Update affected products." }, { "date": "2021-07-13T18:42:53+00:00", "number": "1.6.0", "summary": "Added additional fixed releases for Meraki products." }, { "date": "2021-08-30T19:06:07+00:00", "number": "1.7.0", "summary": "Updated fixed release details for multiple products." }, { "date": "2021-10-05T14:54:59+00:00", "number": "1.8.0", "summary": "Updated fixed release details for Aironet 1532/AP803 products." }, { "date": "2021-12-15T15:47:26+00:00", "number": "1.9.0", "summary": "Updated fixed releases." } ], "status": "final", "version": "1.9.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco Aironet Access Point Software", "product": { "name": "Cisco Aironet Access Point Software ", "product_id": "CSAFPID-190024" } }, { "category": "product_family", "name": "Cisco IP Phones with Multiplatform Firmware", "product": { "name": "Cisco IP Phones with Multiplatform Firmware ", "product_id": "CSAFPID-277607" } }, { "category": "product_family", "name": "Cisco TelePresence Endpoint Software (TC/CE)", "product": { "name": "Cisco TelePresence Endpoint Software (TC/CE) ", "product_id": "CSAFPID-278404" } }, { "category": "product_family", "name": "Cisco Webex Room Phone", "product": { "name": "Cisco Webex Room Phone ", "product_id": "CSAFPID-278888" } }, { "category": "product_family", "name": "Cisco Business Wireless Access Point Software", "product": { "name": "Cisco Business Wireless Access Point Software ", "product_id": "CSAFPID-280012" } }, { "category": "product_family", "name": "Cisco Aironet Access Point Software (IOS XE Controller)", "product": { "name": "Cisco Aironet Access Point Software (IOS XE Controller) ", "product_id": "CSAFPID-280019" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-26144", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-280019", "CSAFPID-190024", "CSAFPID-280012" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-26144" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-277607" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-26141" }, { "cve": "CVE-2020-26146", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx24420" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24425" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24441" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24440" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24449" }, { "system_name": "Cisco Bug ID", "text": "CSCvy32694" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-190024", "CSAFPID-277607", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-278404", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-190024", "CSAFPID-277607", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-278404" ] } ], "title": "vuln-CVE-2020-26146" }, { "cve": "CVE-2020-26147", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-277607" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-26147" }, { "cve": "CVE-2020-26140", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-277607" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-26140" }, { "cve": "CVE-2020-26142", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-277607" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-26142" }, { "cve": "CVE-2020-26143", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-277607" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404" ] } ], "title": "vuln-CVE-2020-26143" }, { "cve": "CVE-2020-26145", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24420" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404" ] } ], "title": "vuln-CVE-2020-26145" }, { "cve": "CVE-2020-26139", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24420" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278888", "CSAFPID-278404" ] } ], "title": "vuln-CVE-2020-26139" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24420" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24425" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24449" }, { "system_name": "Cisco Bug ID", "text": "CSCvy32680" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-280012", "CSAFPID-190024", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-24587" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24425" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24441" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24449" }, { "system_name": "Cisco Bug ID", "text": "CSCvy32680" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx60997" }, { "system_name": "Cisco Bug ID", "text": "CSCvx61001" }, { "system_name": "Cisco Bug ID", "text": "CSCvx61012" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" }, { "system_name": "Cisco Bug ID", "text": "CSCvx61020" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-280012", "CSAFPID-190024", "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-280012", "CSAFPID-190024", "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-24586" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx24420" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24428" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24425" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24423" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24439" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24456" }, { "system_name": "Cisco Bug ID", "text": "CSCvx24452" }, { "system_name": "Cisco Bug ID", "text": "CSCvy32690" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62884" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62876" }, { "system_name": "Cisco Bug ID", "text": "CSCvx89821" }, { "system_name": "Cisco Bug ID", "text": "CSCvx62886" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888", "CSAFPID-280019" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278404", "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-278888", "CSAFPID-277607", "CSAFPID-280019" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-190024", "CSAFPID-280012", "CSAFPID-277607", "CSAFPID-278404", "CSAFPID-278888" ] } ], "title": "vuln-CVE-2020-24588" } ] }
ghsa-f2g3-x645-4qw2
Vulnerability from github
Published
2022-05-24 19:01
Modified
2022-05-24 19:01
Details
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
{ "affected": [], "aliases": [ "CVE-2020-26142" ], "database_specific": { "cwe_ids": [ "CWE-74" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-05-11T20:15:00Z", "severity": "HIGH" }, "details": "An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.", "id": "GHSA-f2g3-x645-4qw2", "modified": "2022-05-24T19:01:58Z", "published": "2022-05-24T19:01:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26142" }, { "type": "WEB", "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "type": "WEB", "url": "https://www.fragattacks.com" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.