Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ieee ieee 802.11 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2006-0226
Integer overflow in IEEE 802.11 network subsystem (ieee80211_ioctl.c) in FreeBSD prior to 6.0-STABLE, while scanning for wireless networks, allows remote malicious users to execute arbitrary code by broadcasting crafted (1) beacon or (2) probe response frames.
Freebsd Freebsd 6.0
4.3
CVSSv2
CVE-2016-4078
The IEEE 802.11 dissector in Wireshark 1.12.x prior to 1.12.11 and 2.0.x prior to 2.0.3 does not properly restrict element lists, which allows remote malicious users to cause a denial of service (deep recursion and application crash) via a crafted packet, related to epan/dissecto...
Wireshark Wireshark 2.0.0
Wireshark Wireshark 1.12.4
Wireshark Wireshark 1.12.10
Wireshark Wireshark 1.12.5
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.12.9
Wireshark Wireshark 2.0.1
Wireshark Wireshark 1.12.2
Wireshark Wireshark 2.0.2
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.12.7
Wireshark Wireshark 1.12.6
Wireshark Wireshark 1.12.3
Wireshark Wireshark 1.12.8
4.3
CVSSv2
CVE-2016-4416
epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 2.x prior to 2.0.2 mishandles the Grouping subfield, which allows remote malicious users to cause a denial of service (buffer over-read and application crash) via a crafted packet.
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.1
2.9
CVSSv2
CVE-2020-24586
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragm...
Ieee Ieee 802.11
Debian Debian Linux 9.0
Linux Mac80211 -
Arista C-250 Firmware
Arista C-260 Firmware
Arista C-230 Firmware
Arista C-235 Firmware
Arista C-200 Firmware
Intel Ax210 Firmware
Intel Ax201 Firmware
Intel Ax200 Firmware
Intel Ac 9560 Firmware
Intel Ac 9462 Firmware
Intel Ac 9461 Firmware
Intel Ac 9260 Firmware
Intel Ac 8265 Firmware
Intel Ac 8260 Firmware
Intel Ac 3168 Firmware
Intel Ac 7265 Firmware
Intel Ac 3165 Firmware
Intel Ax1675 Firmware -
Intel Ax1650 Firmware -
2.9
CVSSv2
CVE-2020-26146
An issue exists on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fr...
Samsung Galaxy I9305 Firmware 4.4.4
Arista C-250 Firmware
Arista C-260 Firmware
Arista C-230 Firmware
Arista C-235 Firmware
Arista C-200 Firmware
Arista C-120 Firmware
Arista C-130 Firmware
Arista C-100 Firmware
Arista C-110 Firmware
Arista O-105 Firmware
Arista W-118 Firmware
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11n Firmware
Siemens Scalance W1700 Ieee 802.11ac Firmware
Siemens Scalance W1750d Firmware
5
CVSSv2
CVE-2015-3814
The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x prior to 1.10.14 and 1.12.x prior to 1.12.5 interpret a zero value as a length rather than an error condition, which allows re...
Oracle Solaris 11.2
Wireshark Wireshark 1.12.4
Wireshark Wireshark 1.10.8
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.10.6
Wireshark Wireshark 1.10.9
Wireshark Wireshark 1.10.13
Wireshark Wireshark 1.10.12
Wireshark Wireshark 1.10.10
Wireshark Wireshark 1.10.0
Wireshark Wireshark 1.12.2
Wireshark Wireshark 1.10.3
Wireshark Wireshark 1.10.2
Wireshark Wireshark 1.10.1
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.10.7
Wireshark Wireshark 1.10.4
Wireshark Wireshark 1.10.14
Wireshark Wireshark 1.12.3
Wireshark Wireshark 1.10.5
Wireshark Wireshark 1.10.11
3.3
CVSSv2
CVE-2020-26144
An issue exists on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary netw...
Samsung Galaxy I9305 Firmware 4.4.4
Arista C-250 Firmware
Arista C-260 Firmware
Arista C-230 Firmware
Arista C-235 Firmware
Arista C-200 Firmware
Arista C-120 Firmware
Arista C-130 Firmware
Arista C-100 Firmware
Arista C-110 Firmware
Arista O-105 Firmware
Arista W-118 Firmware
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11ax Firmware
Siemens Scalance W700 Ieee 802.11n Firmware
NA
CVE-2022-23088
The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, lead...
2 Github repositories
3.2
CVSSv2
CVE-2020-26147
An issue exists in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragment...
Linux Linux Kernel
Debian Debian Linux 9.0
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11n Firmware
Siemens Scalance W1700 Ieee 802.11ac Firmware
NA
CVE-2023-52424
The IEEE 802.11 standard sometimes enables an adversary to trick a victim into connecting to an unintended or untrusted network with Home WEP, Home WPA3 SAE-loop. Enterprise 802.1X/EAP, Mesh AMPE, or FILS, aka an "SSID Confusion" issue. This occurs because the SSID is n...
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »