First published: Tue May 11 2021(Updated: )
A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel's WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.rt7.130.el8 | 0:4.18.0-348.rt7.130.el8 |
redhat/kernel | <0:4.18.0-348.el8 | 0:4.18.0-348.el8 |
redhat/Kernel | <5.13 | 5.13 |
Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | >=4.4<4.4.271 | |
Linux kernel | >=4.9<4.9.271 | |
Linux kernel | >=4.14<4.14.235 | |
Linux kernel | >=4.19<4.19.193 | |
Linux kernel | >=5.4<5.4.124 | |
Linux kernel | >=5.10<5.10.42 | |
Linux kernel | >=5.12<5.12.9 | |
Debian | =9.0 | |
All of | ||
arista c-75 firmware | ||
Arista C75-E | ||
All of | ||
Arista O-90 | ||
Arista O90E | ||
All of | ||
arista c-65 firmware | ||
arista c-65 | ||
All of | ||
Arista W-68 | ||
Arista W-68 | ||
All of | ||
siemens scalance w700 ieee 802.11n firmware | ||
Siemens SCALANCE W700 IEEE 802.11a/b/g/n | ||
All of | ||
Siemens SCALANCE W1700 IEEE 802.11ac | ||
Siemens SCALANCE W1700 IEEE 802.11ac Firmware | ||
arista c-75 firmware | ||
Arista C75-E | ||
Arista O-90 | ||
Arista O90E | ||
arista c-65 firmware | ||
arista c-65 | ||
Arista W-68 | ||
Arista W-68 | ||
siemens scalance w700 ieee 802.11n firmware | ||
Siemens SCALANCE W700 IEEE 802.11a/b/g/n | ||
Siemens SCALANCE W1700 IEEE 802.11ac | ||
Siemens SCALANCE W1700 IEEE 802.11ac Firmware |
Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26147 is classified as a high-severity vulnerability due to the potential for packet injection and data exfiltration.
To remediate CVE-2020-26147, update your system to kernel version 0:4.18.0-348.rt7.130.el8 or kernel version 0:4.18.0-348.el8 or higher.
CVE-2020-26147 affects various versions of the Linux Kernel, including versions between 4.4 and 5.12.
Yes, CVE-2020-26147 can be exploited remotely through the injection of handcrafted packets when fragmented frames are used.
CVE-2020-26147 can lead to serious security breaches by allowing attackers to intercept and manipulate fragmented wireless packets.