First published: Wed Feb 03 2021(Updated: )
The function ClientEAPOLKeyRecvd() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an rtl_memcpy() operation, resulting in a stack buffer overflow which can be exploited for denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker does not need to know the network's PSK.
Credit: vuln@vdoo.com
Affected Software | Affected Version | How to fix |
---|---|---|
Realtek Rtl8195a Firmware | <2.08 | |
Realtek RTL8195A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-25857 is high, with a CVSS score of 7.5.
CVE-2020-25857 allows an attacker to exploit a stack buffer overflow vulnerability in the Realtek RTL8195A Wi-Fi Module, leading to a denial of service.
CVE-2020-25857 affects Realtek RTL8195A firmware versions up to and excluding 2.08.
To mitigate CVE-2020-25857, it is recommended to update the Realtek RTL8195A firmware to versions released after April 2020 (excluding 2.08).
The Common Weakness Enumeration (CWE) ID of CVE-2020-25857 includes CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), CWE-787 (Out-of-bounds Write), and CWE-121 (Stack-based Buffer Overflow).