First published: Mon Jul 06 2020(Updated: )
An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Realtek RTL8711AF | <2.0.6 | |
Realtek RTL8711AF | ||
Realtek Rtl8711am | <2.0.6 | |
Realtek Rtl8711am Firmware | ||
Realtek RTL8195AM Firmware | <2.0.6 | |
Realtek RTL8195AM Firmware | ||
Realtek Rtl8710af | <2.0.6 | |
Realtek RTL8710AF Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9395 is a vulnerability discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before version 2.0.6.
CVE-2020-9395 has a severity level of high.
CVE-2020-9395 affects Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before version 2.0.6.
Realtek devices running firmware versions up to 2.0.6 are vulnerable to CVE-2020-9395.
To fix CVE-2020-9395, you need to update your Realtek device firmware to version 2.0.6 or higher.