CVE-2020-24586

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:arista:c-250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:arista:c-260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:arista:c-235_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:arista:c-200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_7265:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:intel:ax1675_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:ax1675:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:intel:ax1650_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:intel:ac_1550_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_1550:-:*:*:*:*:*:*:*

Configuration 24 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

01 Apr 2023, 22:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html -

12 Jul 2022, 17:09

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel

03 Dec 2021, 02:21

Type Values Removed Values Added
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu - Third Party Advisory
References (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 - (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html - Mailing List, Third Party Advisory
References (CONFIRM) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html - (CONFIRM) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html - Mailing List, Third Party Advisory
CPE cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*
cpe:2.3:o:arista:c-235_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:arista:c-200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*
cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*
cpe:2.3:o:arista:c-260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_1550:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*
cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_1550_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_7265:-:*:*:*:*:*:*:*
cpe:2.3:o:intel:ax1650_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:intel:ax1675_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:ax1675:-:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:arista:c-250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*

28 Oct 2021, 15:15

Type Values Removed Values Added
References
  • (CONFIRM) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html -
  • (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -
  • (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 -

23 Jun 2021, 02:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html -

28 May 2021, 19:00

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 4.6
v2 : 2.9
v3 : 3.5

21 May 2021, 16:26

Type Values Removed Values Added
CVSS v2 : 4.8
v3 : 8.1
v2 : 4.3
v3 : 4.6

19 May 2021, 14:56

Type Values Removed Values Added
References (MLIST) http://www.openwall.com/lists/oss-security/2021/05/11/12 - (MLIST) http://www.openwall.com/lists/oss-security/2021/05/11/12 - Mailing List, Third Party Advisory
References (MISC) https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md - (MISC) https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md - Third Party Advisory
References (MISC) https://www.fragattacks.com - (MISC) https://www.fragattacks.com - Exploit, Third Party Advisory
CWE NVD-CWE-Other
CPE cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*
cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.8
v3 : 8.1

11 May 2021, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-11 20:15

Updated : 2023-12-10 13:55


NVD link : CVE-2020-24586

Mitre link : CVE-2020-24586

CVE.ORG link : CVE-2020-24586


JSON object : View

Products Affected

ieee

  • ieee_802.11

intel

  • ax1650
  • ac_8260
  • ac_3168_firmware
  • ac_3165
  • ac_9462
  • ac_1550_firmware
  • ax200
  • ax1675
  • ax200_firmware
  • ac_8265
  • ac_9461
  • ac_9560_firmware
  • ac_1550
  • ac_7265_firmware
  • ac_7265
  • ac_8260_firmware
  • ac_9462_firmware
  • ac_9461_firmware
  • ax201
  • ac_8265_firmware
  • ax201_firmware
  • ac_9260_firmware
  • ax210
  • ax1650_firmware
  • ac_9560
  • ax210_firmware
  • ax1675_firmware
  • ac_3168
  • ac_9260
  • ac_3165_firmware

arista

  • c-250
  • c-230_firmware
  • c-260
  • c-235_firmware
  • c-235
  • c-260_firmware
  • c-230
  • c-200_firmware
  • c-250_firmware
  • c-200

linux

  • linux_kernel
  • mac80211

debian

  • debian_linux