First published: Wed Sep 30 2020(Updated: )
A partial authentication bypass vulnerability exists on Realtek RTL8812AR 1.21WW, RTL8196D 1.0.0, RTL8192ER 2.10, and RTL8881AN 1.09 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Realtek Rtl8812ar Firmware | =1.21ww | |
Realtek RTL8812AR | ||
Realtek Rtl8196d Firmware | =1.0.0 | |
Realtek Rtl8196d | ||
Realtek Rtl8192er Firmware | =2.10 | |
Realtek Rtl8192er | ||
Realtek Rtl8881an Firmware | =1.09 | |
Realtek Rtl8881an |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18990 is a partial authentication bypass vulnerability that exists on Realtek RTL8812AR 1.21WW, RTL8196D 1.0.0, RTL8192ER 2.10, and RTL8881AN 1.09 devices.
CVE-2019-18990 allows an attacker to send an unencrypted data frame to a WPA2-protected WLAN router, bypassing partial authentication and potentially gaining unauthorized access.
CVE-2019-18990 has a severity rating of medium, with a CVSS score of 5.4.
Realtek RTL8812AR 1.21WW, RTL8196D 1.0.0, RTL8192ER 2.10, and RTL8881AN 1.09 devices are affected by CVE-2019-18990.
To mitigate CVE-2019-18990, apply the latest firmware updates provided by Realtek for the affected devices.