The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
| Link | Resource |
|---|---|
| https://www.fragattacks.com | Exploit Third Party Advisory |
| https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2021/05/11/12 | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | Mailing List Third Party Advisory |
| https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | Third Party Advisory |
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | |
| https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html | |
| https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-05-11 20:15
Updated : 2022-07-12 17:42
NVD link : CVE-2020-24588
Mitre link : CVE-2020-24588
JSON object : View
Products Affected
microsoft
- windows_8.1
- windows_server_2008
- windows_10
- windows_rt_8.1
- windows_7
- windows_server_2019
- windows_server_2016
- windows_server_2012
ieee
- ieee_802.11
debian
- debian_linux
linux
- mac80211
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
