First published: Sat Jan 19 2019(Updated: )
The ThreadX-based firmware on Marvell Avastar Wi-Fi devices, models 88W8787, 88W8797, 88W8801, 88W8897, and 88W8997, allows remote attackers to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of available Wi-Fi networks. Exploitation of the Wi-Fi device can lead to exploitation of the host application processor in some cases, but this depends on several factors including host OS hardening and the availability of DMA.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Marvell 88w8787 Firmware | ||
Marvell 88w8787 | ||
Marvell 88w8797 Firmware | ||
Marvell 88w8797 | ||
Marvell 88w8801 Firmware | ||
Marvell 88w8801 | ||
Marvell 88w8897 Firmware | ||
Marvell 88w8897 | ||
Marvell 88w8997 Firmware | ||
Marvell 88w8997 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6496 is a vulnerability in the ThreadX-based firmware on Marvell Avastar Wi-Fi devices, allowing remote code execution or denial of service.
Models 88W8787, 88W8797, 88W8801, 88W8897, and 88W8997 are affected by CVE-2019-6496.
The severity of CVE-2019-6496 is rated as high, with a CVSS score of 8.8.
CVE-2019-6496 can be exploited by sending malformed Wi-Fi packets during the identification of available Wi-Fi networks.
Yes, you can refer to the following sources for more information on CVE-2019-6496: http://www.securityfocus.com/bid/106865, https://2018.zeronights.ru/wp-content/uploads/materials/19-Researching-Marvell-Avastar-Wi-Fi.pdf, https://embedi.org/blog/remotely-compromise-devices-by-using-bugs-in-marvell-avastar-wi-fi-from-zero-knowledge-to-zero-click-rce/