First published: Tue May 11 2021(Updated: )
On May 11, 2021, the research paper Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation was made public. This paper discusses 12 vulnerabilities in the 802.11 standard. One vulnerability is in the frame aggregation functionality, two vulnerabilities are in the frame fragmentation functionality, and the other nine are implementation vulnerabilities. These vulnerabilities could allow an attacker to forge encrypted frames, which could in turn enable the exfiltration of sensitive data from a targeted device. This advisory will be updated as additional information becomes available. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
Credit: These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef New York University Abu Dhabisupport during the handling these vulnerabilities
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Products |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-wifi-faf-22epcEWu is high due to multiple vulnerabilities in the Wi-Fi 802.11 standard.
To mitigate cisco-sa-wifi-faf-22epcEWu, apply the latest patches provided by Cisco for affected products.
cisco-sa-wifi-faf-22epcEWu discusses vulnerabilities related to frame aggregation and fragmentation in the Wi-Fi standard.
cisco-sa-wifi-faf-22epcEWu affects various Cisco products that implement the 802.11 standard.
cisco-sa-wifi-faf-22epcEWu was disclosed on May 11, 2021, following the publication of a research paper.