First published: Tue May 11 2021(Updated: )
A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.rt7.130.el8 | 0:4.18.0-348.rt7.130.el8 |
redhat/kernel | <0:4.18.0-348.el8 | 0:4.18.0-348.el8 |
redhat/Kernel | <5.13 | 5.13 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
All of | ||
Samsung Galaxy i9305 Firmware | =4.4.4 | |
Samsung Galaxy i9305 | ||
All of | ||
Siemens 6GK5763-1AL00-7DA0 | <1.2 | |
siemens 6gk5763-1al00-7da0 firmware | ||
All of | ||
Siemens 6GK5766-1GE00-7DA0 Firmware | <1.2 | |
Siemens 6GK5766-1GE00-7DA0 Firmware | ||
All of | ||
Siemens 6GK5766-1GE00-7DB0 | <1.2 | |
Siemens 6GK5766-1GE00-7DA0 Firmware | ||
All of | ||
Siemens 6GK5766-1JE00-7DA0 Firmware | <1.2 | |
Siemens 6GK5766-1JE00-7DA0 Firmware | ||
All of | ||
Siemens 6GK5766-1GE00-7TA0 | <1.2 | |
Siemens 6GK5766-1GE00-7TA0 Firmware | ||
All of | ||
siemens 6gk5766-1ge00-7tb0 firmware | <1.2 | |
Siemens 6GK5766-1GE00-7TB0 | ||
All of | ||
Siemens 6GK5766-1JE00-7TA0 | <1.2 | |
Siemens 6GK5766-1JE00-7TA0 Firmware | ||
All of | ||
Siemens 6GK5763-1AL00-3AA0 | <1.2 | |
Siemens 6GK5763-1AL00-3AA0 Firmware | ||
All of | ||
Siemens 6GK5763-1AL00-3DA0 | <1.2 | |
Siemens SCALANCE WUM763-1 | ||
All of | ||
siemens 6gk5766-1ge00-3da0 firmware | <1.2 | |
Siemens 6GK5766-1GE00-3DA0 | ||
All of | ||
Siemens 6GK5766-1GE00-3DB0 | <1.2 | |
Siemens 6GK5766-1GE00-3DB0 | ||
All of | ||
Siemens 6GK5766-1JE00-7DA0 Firmware | <1.2 | |
Siemens 6GK5766-1JE00-3DA0 Firmware | ||
Samsung Galaxy i9305 Firmware | =4.4.4 | |
Samsung Galaxy i9305 | ||
Siemens 6GK5763-1AL00-7DA0 | <1.2 | |
siemens 6gk5763-1al00-7da0 firmware | ||
Siemens 6GK5766-1GE00-7DA0 Firmware | <1.2 | |
Siemens 6GK5766-1GE00-7DA0 Firmware | ||
Siemens 6GK5766-1GE00-7DB0 | <1.2 | |
Siemens 6GK5766-1GE00-7DA0 Firmware | ||
Siemens 6GK5766-1JE00-7DA0 Firmware | <1.2 | |
Siemens 6GK5766-1JE00-7DA0 Firmware | ||
Siemens 6GK5766-1GE00-7TA0 | <1.2 | |
Siemens 6GK5766-1GE00-7TA0 Firmware | ||
siemens 6gk5766-1ge00-7tb0 firmware | <1.2 | |
Siemens 6GK5766-1GE00-7TB0 | ||
Siemens 6GK5766-1JE00-7TA0 | <1.2 | |
Siemens 6GK5766-1JE00-7TA0 Firmware | ||
Siemens 6GK5763-1AL00-3AA0 | <1.2 | |
Siemens 6GK5763-1AL00-3AA0 Firmware | ||
Siemens 6GK5763-1AL00-3DA0 | <1.2 | |
Siemens SCALANCE WUM763-1 | ||
siemens 6gk5766-1ge00-3da0 firmware | <1.2 | |
Siemens 6GK5766-1GE00-3DA0 | ||
Siemens 6GK5766-1GE00-3DB0 | <1.2 | |
Siemens 6GK5766-1GE00-3DB0 | ||
Siemens 6GK5766-1JE00-7DA0 Firmware | <1.2 | |
Siemens 6GK5766-1JE00-3DA0 Firmware | ||
Android |
Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26145 has a high severity rating due to its potential to allow attackers to exploit the wireless stack in affected systems.
To fix CVE-2020-26145, update your Linux kernel to the recommended versions such as 0:4.18.0-348.el8 or later versions provided by your distribution.
CVE-2020-26145 affects multiple systems including Red Hat kernels, Google Android, and specific Siemens firmware.
Exploitation of CVE-2020-26145 could lead to denial of service or unauthorized access through manipulated wireless frames.
Employing network segmentation and monitoring can help mitigate the risks associated with CVE-2020-26145 until systems can be updated.