Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qm32-jcf4-2654

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A partial authentication bypass vulnerability exists on Atheros AR9132 3.60(AMX.8), AR9283 1.85, and AR9285 1.0.0.12NA devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.

A partial authentication bypass vulnerability exists on Atheros AR9132 3.60(AMX.8), AR9283 1.85, and AR9285 1.0.0.12NA devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.

EPSS

Процентиль: 10%
0.00036
Низкий

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 5.4
nvd
больше 5 лет назад

A partial authentication bypass vulnerability exists on Atheros AR9132 3.60(AMX.8), AR9283 1.85, and AR9285 1.0.0.12NA devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.

EPSS

Процентиль: 10%
0.00036
Низкий

Дефекты

CWE-287