3.5
CVSSv3

CVE-2020-24588

Published: 11/05/2021 Updated: 01/04/2023
CVSS v2 Base Score: 2.9 | Impact Score: 2.9 | Exploitability Score: 5.5
CVSS v3 Base Score: 3.5 | Impact Score: 1.4 | Exploitability Score: 2.1
VMScore: 259
Vector: AV:A/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device. (CVE-2020-24586) A flaw was found in the Linux kernel's WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an malicious user to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality. (CVE-2020-24587) A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type. (CVE-2020-24588) Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP. (CVE-2020-26139) A vulnerability was found in Linux kernel's WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. (CVE-2020-26141) A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity. (CVE-2020-26145) A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel's WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity. (CVE-2020-26147) A flaw was found in the Linux kernel in certs/blacklist.c, When signature entries for EFI_CERT_X509_GUID are contained in the Secure Boot Forbidden Signature Database, the entries are skipped. This can cause a security threat and breach system integrity, confidentiality and even lead to a denial of service problem. (CVE-2020-26541) A vulnerability was found in the bluez, where Passkey Entry protocol used in Secure Simple Pairing (SSP), Secure Connections (SC) and LE Secure Connections (LESC) of the Bluetooth Core Specification is vulnerable to an impersonation attack where an active attacker can impersonate the initiating device without any previous knowledge. (CVE-2020-26558) A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity. (CVE-2021-0129) A flaw was found in the Linux kernel's KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability. (CVE-2021-22543) A flaw was found in the Linux kernel's handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2021-32399) A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability. (CVE-2021-33034) The canbus filesystem in the Linux kernel contains an information leak of kernel memory to devices on the CAN bus network link layer. An attacker with the ability to dump messages on the CAN bus is able to learn of uninitialized stack values by dumbing messages on the can bus. (CVE-2021-34693) An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel. A bounds check failure allows a local malicious user to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability. (CVE-2021-3506) A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. (CVE-2021-3564) A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. (CVE-2021-3573) A flaw was found in the Linux kernels NFC implementation, A NULL pointer dereference and BUG leading to a denial of service can be triggered by a local unprivileged user causing a kernel panic. (CVE-2021-38208)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ieee ieee 802.11

linux mac80211 -

microsoft windows server 2008 r2

microsoft windows 10 1607

microsoft windows 8.1 -

microsoft windows server 2016 -

microsoft windows server 2008 -

microsoft windows 7 -

microsoft windows rt 8.1 -

microsoft windows server 2012 -

microsoft windows 10 -

microsoft windows 10 1803

microsoft windows server 2019 -

microsoft windows 10 1809

microsoft windows 10 1909

microsoft windows 10 2004

microsoft windows server 2016 2004

microsoft windows 10 20h2

debian debian linux 9.0

siemens scalance w1748-1 firmware -

siemens scalance w1750d firmware -

siemens scalance w1788-1 firmware -

siemens scalance w1788-2 firmware -

siemens scalance w1788-2ia firmware -

siemens scalance w721-1 firmware -

siemens scalance w722-1 firmware -

siemens scalance w734-1 firmware -

siemens scalance w738-1 firmware -

siemens scalance w748-1 firmware -

siemens scalance w761-1 firmware -

siemens scalance w774-1 firmware -

siemens scalance w778-1 firmware -

siemens scalance w786-1 firmware -

siemens scalance w786-2 firmware -

siemens scalance w786-2ia firmware -

siemens scalance w788-1 firmware -

siemens scalance w788-2 firmware -

siemens scalance wam763-1 firmware -

siemens scalance wam766-1 firmware -

siemens scalance wam766-1 6ghz firmware -

siemens scalance wum763-1 firmware -

siemens scalance wum766-1 firmware -

siemens scalance wum766-1 6ghz firmware -

arista c-100 firmware -

arista c-110 firmware -

arista c-120 firmware -

arista c-130 firmware -

arista c-200 firmware -

arista c-230 firmware -

arista c-235 firmware -

arista c-250 firmware -

arista c-260 firmware -

arista c-65 firmware -

arista c-75 firmware -

arista o-105 firmware -

arista o-90 firmware -

arista w-118 firmware -

arista w-68 firmware -

cisco 1100 firmware -

cisco 1100-4p firmware -

cisco 1100-8p firmware -

cisco 1101-4p firmware -

cisco 1109-2p firmware -

cisco 1109-4p firmware -

cisco aironet 1532 firmware -

cisco aironet 1542d firmware -

cisco aironet 1542i firmware -

cisco aironet 1800 firmware -

cisco aironet 1800i firmware -

cisco aironet 1810 firmware -

cisco aironet 1810w firmware -

cisco aironet 1815 firmware -

cisco aironet 1815i firmware -

cisco aironet 1832 firmware -

cisco aironet 1842 firmware -

cisco aironet 1852 firmware -

cisco aironet ap803 firmware -

cisco aironet iw3702 firmware -

cisco catalyst 9105 firmware -

cisco catalyst 9105axi firmware -

cisco catalyst 9105axw firmware -

cisco catalyst 9115 firmware -

cisco catalyst 9115 ap firmware -

cisco catalyst 9115axe firmware -

cisco catalyst 9115axi firmware -

cisco catalyst 9117 firmware -

cisco catalyst 9117 ap firmware -

cisco catalyst 9117axi firmware -

cisco catalyst 9120 firmware -

cisco catalyst 9120 ap firmware -

cisco catalyst 9120axe firmware -

cisco catalyst 9120axi firmware -

cisco catalyst 9120axp firmware -

cisco catalyst 9124 firmware -

cisco catalyst 9124axd firmware -

cisco catalyst 9124axi firmware -

cisco catalyst 9130 firmware -

cisco catalyst 9130 ap firmware -

cisco catalyst 9130axe firmware -

cisco catalyst 9130axi firmware -

cisco ip phone 6861 firmware -

cisco ip phone 8821 firmware -

cisco ip phone 8832 firmware -

cisco ip phone 8861 firmware -

cisco ip phone 8865 firmware -

cisco ir829-2lte-ea-ak9 firmware -

cisco ir829-2lte-ea-bk9 firmware -

cisco ir829-2lte-ea-ek9 firmware -

cisco ir829gw-lte-ga-ck9 firmware -

cisco ir829gw-lte-ga-ek9 firmware -

cisco ir829gw-lte-ga-sk9 firmware -

cisco ir829gw-lte-ga-zk9 firmware -

cisco ir829gw-lte-na-ak9 firmware -

cisco ir829gw-lte-vz-ak9 firmware -

cisco meraki gr10 firmware -

cisco meraki gr60 firmware -

cisco meraki mr12 firmware -

cisco meraki mr20 firmware -

cisco meraki mr26 firmware -

cisco meraki mr30h firmware -

cisco meraki mr32 firmware -

cisco meraki mr33 firmware -

cisco meraki mr34 firmware -

cisco meraki mr36 firmware -

cisco meraki mr42 firmware -

cisco meraki mr42e firmware -

cisco meraki mr44 firmware -

cisco meraki mr45 firmware -

cisco meraki mr46 firmware -

cisco meraki mr46e firmware -

cisco meraki mr52 firmware -

cisco meraki mr53 firmware -

cisco meraki mr53e firmware -

cisco meraki mr55 firmware -

cisco meraki mr56 firmware -

cisco meraki mr62 firmware -

cisco meraki mr66 firmware -

cisco meraki mr70 firmware -

cisco meraki mr72 firmware -

cisco meraki mr74 firmware -

cisco meraki mr76 firmware -

cisco meraki mr84 firmware -

cisco meraki mr86 firmware -

cisco meraki mx64w firmware -

cisco meraki mx65w firmware -

cisco meraki mx67cw firmware -

cisco meraki mx67w firmware -

cisco meraki mx68cw firmware -

cisco meraki mx68w firmware -

cisco meraki z3 firmware -

cisco meraki z3c firmware -

cisco webex board 55 firmware -

cisco webex board 55s firmware -

cisco webex board 70 firmware -

cisco webex board 70s firmware -

cisco webex board 85s firmware -

cisco webex dx70 firmware -

cisco webex dx80 firmware -

cisco webex room 55 firmware -

cisco webex room 55 dual firmware -

cisco webex room 70 firmware -

cisco webex room 70 dual firmware -

cisco webex room 70 dual g2 firmware -

cisco webex room 70 single firmware -

cisco webex room 70 single g2 firmware -

cisco webex room kit firmware -

cisco webex room kit mini firmware -

intel ac 8260 firmware -

intel ac 8265 firmware -

intel ac 9260 firmware -

intel ac 9560 firmware -

intel killer ac 1550 firmware -

intel killer wi-fi 6 ax1650 firmware -

intel killer wi-fi 6e ax1675 firmware -

intel proset ac 3165 firmware -

intel proset ac 3168 firmware -

intel proset ac 8260 firmware -

intel proset ac 8265 firmware -

intel proset ac 9260 firmware -

intel proset ac 9461 firmware -

intel proset ac 9462 firmware -

intel proset ac 9560 firmware -

intel proset wi-fi 6 ax200 firmware -

intel proset wi-fi 6 ax201 firmware -

intel proset wi-fi 6e ax210 firmware -

intel proset wireless 7265 (rev d) firmware -

intel wi-fi 6 ax200 firmware -

intel wi-fi 6 ax201 firmware -

linux linux kernel

Vendor Advisories

A flaw was found in the Linux kernels wifi implementation An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data This can cause the frame to pass checks and be considered a valid frame of a different type ...
A flaw was found in the Linux kernels implementation of wifi fragmentation handling An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device (CVE-2020-24586) A flaw was found in the Linux kernel ...
A flaw was found in the Linux kernels implementation of wifi fragmentation handling An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device (CVE-2020-24586) A flaw was found in the Linux kernel ...
On May 11, 2021, the research paper Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation was made public This paper discusses 12 vulnerabilities in the 80211 standard One vulnerability is in the frame aggregation functionality, two vulnerabilities are in the frame fragmentation functionality, and the other nine are impl ...
Severity Unknown Remote Unknown Type Unknown Description AVG-1879 linux 5122arch1-1 Medium Vulnerable ...

Mailing Lists

Hi, Several security issues in the 80211 implementations were found by Mathy Vanhoef (New York University Abu Dhabi), who has published all the details at papersmathyvanhoefcom/usenix2021pdf and wwwfragattackscom/ For Linux, we've developed the set of patches posted here: lorekernelorg/linux-wi ...