Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qrgr-qfr9-4xfh

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 3.5

Описание

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

EPSS

Процентиль: 72%
0.00726
Низкий

3.5 Low

CVSS3

Дефекты

CWE-306
CWE-327

Связанные уязвимости

CVSS3: 3.5
ubuntu
около 4 лет назад

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

CVSS3: 4.3
redhat
около 4 лет назад

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

CVSS3: 3.5
nvd
около 4 лет назад

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

CVSS3: 6.5
msrc
около 4 лет назад

Windows Wireless Networking Spoofing Vulnerability

CVSS3: 3.5
debian
около 4 лет назад

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, ...

EPSS

Процентиль: 72%
0.00726
Низкий

3.5 Low

CVSS3

Дефекты

CWE-306
CWE-327