CVE-2020-24587

low

Description

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.

References

https://www.fragattacks.com

https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md

http://www.openwall.com/lists/oss-security/2021/05/11/12

https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html

https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html

https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63

Details

Source: MITRE

Published: 2021-05-11

Updated: 2021-10-28

Type: CWE-326

Risk Information

CVSS v2

Base Score: 1.8

Vector: AV:A/AC:H/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.2

Severity: LOW

CVSS v3

Base Score: 2.6

Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

Impact Score: 1.4

Exploitability Score: 1.2

Severity: LOW