CVE-2020-24586

Updated: 2023-03-10 12:28:07.061403

Description:

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x LOW 2.9
CVSS Version 3.x LOW 3.5

Status

OS name Project name Version Score Severity Status Errata Last updated
CentOS 6 ELS kernel 2.6.32 3.5 LOW Ignored 2022-01-27 11:19:12
CentOS 8.4 ELS kernel 4.18.0-305.25.1 3.5 LOW Ignored 2022-11-30 10:06:02
CentOS 8.5 ELS kernel 4.18.0-348.7.1 3.5 LOW Not Vulnerable 2022-11-30 10:06:02
CloudLinux 6 ELS kernel 2.6.32 3.5 LOW Ignored 2022-01-27 11:19:12
Oracle Linux 6 ELS kernel 2.6.32 3.5 LOW Ignored 2022-11-30 10:08:55
Ubuntu 16.04 ELS linux 4.4.0 3.5 LOW Released 2021-11-30 17:55:14