An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/05/11/12 | Mailing List Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | Patch Third Party Advisory |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | Third Party Advisory |
https://www.fragattacks.com | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-05-11T19:35:10
Updated: 2021-07-13T12:06:43
Reserved: 2020-09-29T00:00:00
Link: CVE-2020-26145
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-11T20:15:08.873
Modified: 2022-05-13T20:53:57.840
Link: CVE-2020-26145
JSON object: View
Redhat Information
No data.
CWE