First published: Wed Feb 03 2021(Updated: )
The function CheckMic() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an internal function, _rt_md5_hmac_veneer() or _rt_hmac_sha1_veneer(), resulting in a stack buffer over-read which can be exploited for denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker does not need to know the network's PSK.
Credit: vuln@vdoo.com
Affected Software | Affected Version | How to fix |
---|---|---|
Realtek Rtl8195a Firmware | <2.08 | |
Realtek RTL8195A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25853 is a vulnerability in the Realtek RTL8195A Wi-Fi Module that allows for a stack buffer over-read due to a lack of validation in the CheckMic() function.
CVE-2020-25853 has a severity rating of 7.5, which is considered high.
CVE-2020-25853 can be exploited by an attacker to perform a stack buffer over-read.
CVE-2020-25853 affects Realtek RTL8195A Wi-Fi Module firmware versions up to and excluding 2.08.
No, the Realtek RTL8195A itself is not vulnerable to CVE-2020-25853.
Yes, fixes for CVE-2020-25853 were released in versions of the Realtek RTL8195A Wi-Fi Module firmware starting from April 2020 (versions released after 2.08).
CVE-2020-25853 is associated with CWE-125: Out-of-bounds Read and CWE-126: Buffer Over-read.