Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-26142

Опубликовано: 11 мая 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.

Примечания

  • https://papers.mathyvanhoef.com/usenix2021.pdf

  • https://www.fragattacks.com/

  • https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/

  • Issue specific to kernel in OpenBSD

EPSS

Процентиль: 81%
0.01631
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 4 лет назад

An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.

CVSS3: 7.5
redhat
около 4 лет назад

An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.

CVSS3: 5.3
nvd
около 4 лет назад

An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.

github
около 3 лет назад

An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.

CVSS3: 5.3
fstec
около 4 лет назад

Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы OpenBSD, позволяющая нарушителю внедрить произвольные сетевые пакеты

EPSS

Процентиль: 81%
0.01631
Низкий