An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/05/11/12 | Mailing List Third Party Advisory |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | Third Party Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | Third Party Advisory |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | Third Party Advisory |
https://www.fragattacks.com | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-05-11T19:41:14
Updated: 2021-10-28T14:22:01
Reserved: 2020-09-29T00:00:00
Link: CVE-2020-26142
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-11T20:15:08.760
Modified: 2021-12-03T21:12:09.770
Link: CVE-2020-26142
JSON object: View
Redhat Information
No data.
CWE