First published: Wed Sep 30 2020(Updated: )
A partial authentication bypass vulnerability exists on Mediatek MT7620N 1.06 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mediatek MT7620N Firmware | =1.06 | |
Mediatek MT7620N Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18989 has been classified with a moderate severity level due to its potential impact on network security.
To mitigate CVE-2019-18989, secure your WLAN router with strong authentication settings and consider updating to a firmware version that addresses this vulnerability.
CVE-2019-18989 specifically affects Mediatek MT7620N devices running firmware version 1.06.
CVE-2019-18989 allows attackers to bypass authentication and send unencrypted data frames to WPA2-protected routers.
There is currently no publicly available exploit for CVE-2019-18989, but the vulnerability poses a risk if left unaddressed.