Vulnerability Name: | CVE-2020-26143 (CCN-201633) | ||||||||||||||||||
Assigned: | 2020-09-29 | ||||||||||||||||||
Published: | 2021-05-11 | ||||||||||||||||||
Updated: | 2021-12-03 | ||||||||||||||||||
Summary: | An issue was discovered in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration. | ||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
5.7 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 3.3 Low (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||
Vulnerability Type: | CWE-20 CWE-346 | ||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-26143 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20210511 various 802.11 security issues - fragattacks.com Source: CONFIRM Type: Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf Source: XF Type: UNKNOWN cisco-cve202026143-sec-bypass(201633) Source: MISC Type: Third Party Advisory https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md Source: CCN Type: Cisco Security Advisory cisco-sa-wifi-faf-22epcEWu Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 Source: CISCO Type: Third Party Advisory 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 Source: MISC Type: Third Party Advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 Source: MISC Type: Third Party Advisory https://www.fragattacks.com | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration CCN 1: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |