CVE-2020-24586
CVSS v3.1
3.5 (Low)
CVSS v2.0
2.9 (Low)
EPSS
0.17 % (55th)
Affected Products
44
Advisories
36
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
Weaknesses
- CVE Status
- PUBLISHED
- CNA
- MITRE
- Published Date
-
2021-05-11 20:15:08
(3 years ago) - Updated Date
-
2023-04-01 22:15:07
(17 months ago)
Affected Products
- Ac 1550
- Ac 3165
- Ac 3168
- Ac 7265
- Ac 8260
- Ac 8265
- Ac 9260
- Ac 9461
- Ac 9462
- Ac 9560
- Ax1650
- Ax1675
- Ax200
- Ax201
- Ax210
- Ac 1550 Firmware
- Ac 3165 Firmware
- Ac 3168 Firmware
- Ac 7265 Firmware
- Ac 8260 Firmware
- Ac 8265 Firmware
- Ac 9260 Firmware
- Ac 9461 Firmware
- Ac 9462 Firmware
- Ac 9560 Firmware
- Ax1650 Firmware
- Ax1675 Firmware
- Ax200 Firmware
- Ax201 Firmware
- Ax210 Firmware
Loading...
Loading...
Configuration #1
AND |
|
---|
Configuration #2
AND |
|
---|
Configuration #3
AND |
|
---|
Configuration #4
AND |
|
---|
Configuration #5
AND |
|
---|
Configuration #6
AND |
|
---|
Configuration #7
AND |
|
---|
Configuration #8
AND |
|
---|
Configuration #9
AND |
|
---|
Configuration #10
AND |
|
---|
Configuration #11
AND |
|
---|
Configuration #12
AND |
|
---|
Configuration #13
AND |
|
---|
Configuration #14
AND |
|
---|
Configuration #15
AND |
|
---|
Configuration #16
AND |
|
---|
Configuration #17
AND |
|
---|
Configuration #18
AND |
|
---|
Configuration #19
AND |
|
---|
Configuration #20
AND |
|
---|
Configuration #21
AND |
|
---|
Configuration #22
AND |
|
---|
Configuration #23
AND |
|
---|
Configuration #24
AND |
|
---|
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...