Updated: 2023-03-10 12:28:07.061403
Description:
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | LOW | 2.9 |
CVSS Version 3.x | LOW | 3.5 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated |
---|---|---|---|---|---|---|---|
CentOS 6 ELS | kernel | 2.6.32 | 3.5 | LOW | Ignored | 2022-01-27 11:19:12 | |
CentOS 8.4 ELS | kernel | 4.18.0-305.25.1 | 3.5 | LOW | Ignored | 2022-11-30 10:06:02 | |
CentOS 8.5 ELS | kernel | 4.18.0-348.7.1 | 3.5 | LOW | Not Vulnerable | 2022-11-30 10:06:02 | |
CloudLinux 6 ELS | kernel | 2.6.32 | 3.5 | LOW | Ignored | 2022-01-27 11:19:12 | |
Oracle Linux 6 ELS | kernel | 2.6.32 | 3.5 | LOW | Ignored | 2022-11-30 10:08:55 | |
Ubuntu 16.04 ELS | linux | 4.4.0 | 3.5 | LOW | Released | 2021-11-30 17:55:14 |