An issue was discovered in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/05/11/12 - Mailing List, Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf - Third Party Advisory | |
References | () https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu - Third Party Advisory | |
References | () https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 - Third Party Advisory | |
References | () https://www.fragattacks.com - Third Party Advisory |
Information
Published : 2021-05-11 20:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26143
Mitre link : CVE-2020-26143
CVE.ORG link : CVE-2020-26143
JSON object : View
Products Affected
arista
- c-75
- w-68_firmware
- o-90
- o-90_firmware
- c-65
- c-75_firmware
- c-65_firmware
- w-68
alfa
- awus036h
- awus036h_firmware
siemens
- scalance_w700_ieee_802.11n_firmware
- scalance_w700_ieee_802.11n
CWE
CWE-20
Improper Input Validation