First published: Tue May 11 2021(Updated: )
A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.rt7.130.el8 | 0:4.18.0-348.rt7.130.el8 |
redhat/kernel | <0:4.18.0-348.el8 | 0:4.18.0-348.el8 |
Alfa Awus036h Firmware Windows 10 | =1030.36.604 | |
Alfa Awus036h | ||
Arista C-75 Firmware | ||
Arista C-75 | ||
Arista O-90 Firmware | ||
Arista O-90 | ||
Arista C-65 Firmware | ||
Arista C-65 | ||
Arista W-68 Firmware | ||
Arista W-68 | ||
Siemens Scalance W700 Ieee 802.11n Firmware | ||
Siemens SCALANCE W700 IEEE 802.11n |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-26143.
CVE-2020-26143 has a severity level of 6.5 (Medium).
The affected software packages include kernel-rt, kernel, and AWUS036H firmware version 1030.36.604.
CVE-2020-26143 can be exploited to inject packets and/or exfiltrate selected fragments through fragmented frames in WiFi implementations.
Yes, you can find references for CVE-2020-26143 at the following links: [reference 1](https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/), [reference 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1960497), [reference 3](https://access.redhat.com/errata/RHSA-2021:4140).