Vulnerability Name: | CVE-2020-26146 (CCN-201635) | ||||||||||||||||||
Assigned: | 2020-09-29 | ||||||||||||||||||
Published: | 2021-05-11 | ||||||||||||||||||
Updated: | 2021-12-06 | ||||||||||||||||||
Summary: | An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design. | ||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
4.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
4.6 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 2.9 Low (CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||
Vulnerability Type: | CWE-20 CWE-307 | ||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-26146 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20210511 various 802.11 security issues - fragattacks.com Source: CONFIRM Type: Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf Source: XF Type: UNKNOWN cisco-cve202026146-sec-bypass(201635) Source: MISC Type: Third Party Advisory https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md Source: CCN Type: Cisco Security Advisory cisco-sa-wifi-faf-22epcEWu Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 Source: CISCO Type: Third Party Advisory 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 Source: MISC Type: Third Party Advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 Source: MISC Type: Third Party Advisory https://www.fragattacks.com | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration 7: Configuration 8: Configuration 9: Configuration 10: Configuration 11: Configuration 12: Configuration 13: Configuration 14: Configuration 15: Configuration 16: Configuration 17: Configuration 18: Configuration 19: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration CCN 1: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |