First published: Wed Apr 05 2017(Updated: )
On the Broadcom Wi-Fi HardMAC SoC with fbt firmware, a stack buffer overflow occurs when handling an 802.11r (FT) authentication response, leading to remote code execution via a crafted access point that sends a long R0KH-ID field in a Fast BSS Transition Information Element (FT-IE).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Hardmac Wi-fi Soc Firmware | =6.37.34.40 | |
Broadcom Wi-Fi chipsets |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6956 has a critical severity rating due to the potential for remote code execution.
To fix CVE-2017-6956, update the Broadcom HardMAC Wi-Fi SoC firmware to version 6.37.34.40 or later.
CVE-2017-6956 affects Broadcom HardMAC Wi-Fi SoC firmware version 6.37.34.40.
Yes, CVE-2017-6956 can be exploited remotely through a crafted access point.
CVE-2017-6956 describes a stack buffer overflow that can lead to remote code execution.