HomeAlfaCVE-2020-26141

CVE-2020-26141

MEDIUM
6.5CVSS
Published: 2021-05-11
Updated: 2024-11-21
AI Analysis

Description

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.

CVSS Metrics

Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
adjacent network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
high
Availability
none
Weaknesses
CWE-354

Metadata

Primary Vendor
ALFA
Published
5/11/2021
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

alfa : awus036h_firmwarecisco : meraki_gr10_firmwarecisco : meraki_gr60_firmwarecisco : meraki_mr20_firmwarecisco : meraki_mr30h_firmwarecisco : meraki_mr33_firmwarecisco : meraki_mr36_firmwarecisco : meraki_mr42_firmwarecisco : meraki_mr42e_firmwarecisco : meraki_mr44_firmwarecisco : meraki_mr45_firmwarecisco : meraki_mr46_firmwarecisco : meraki_mr46e_firmwarecisco : meraki_mr52_firmwarecisco : meraki_mr53_firmwarecisco : meraki_mr53e_firmwarecisco : meraki_mr55_firmwarecisco : meraki_mr56_firmwarecisco : meraki_mr70_firmwarecisco : meraki_mr74_firmwarecisco : meraki_mr76_firmwarecisco : meraki_mr84_firmwarecisco : meraki_mr86_firmwarecisco : meraki_mr12_firmwarecisco : meraki_mr18_firmwarecisco : meraki_mr26_firmwarecisco : meraki_mr32_firmwarecisco : meraki_mr34_firmwarecisco : meraki_mr62_firmwarecisco : meraki_mr66_firmwarecisco : meraki_mr72_firmwarecisco : meraki_mx64w_firmwarecisco : meraki_mx65w_firmwarecisco : meraki_mx67w_firmwarecisco : meraki_mx67cw_firmwarecisco : meraki_mx68w_firmwarecisco : meraki_mx68cw_firmwarecisco : meraki_z3_firmwarecisco : meraki_z3c_firmwarecisco : wireless_ip_phone_8821_firmwarecisco : ip_phone_6861_firmwarecisco : ip_phone_8861_firmwarecisco : ip_phone_8861_firmwarecisco : ip_phone_8865_firmwarecisco : ip_conference_phone_8832_firmwarecisco : webex_room_series_firmwarecisco : webex_desk_series_firmwarecisco : webex_board_series_firmwarecisco : webex_wireless_phone_860_firmwarecisco : webex_wireless_phone_840_firmwaresiemens : 6gk5778-1gy00-0ab0_firmwaresiemens : 6gk5778-1gy00-0aa0_firmwaresiemens : 6gk5721-1fc00-0aa0_firmwaresiemens : 6gk5721-1fc00-0ab0_firmwaresiemens : 6gk5722-1fc00-0aa0_firmwaresiemens : 6gk5722-1fc00-0ab0_firmwaresiemens : 6gk5722-1fc00-0ac0_firmwaresiemens : 6gk5734-1fx00-0aa0_firmwaresiemens : 6gk5734-1fx00-0aa6_firmwaresiemens : 6gk5734-1fx00-0ab0_firmwaresiemens : 6gk5734-1fx00-0ab6_firmwaresiemens : 6gk5738-1gy00-0aa0_firmwaresiemens : 6gk5738-1gy00-0ab0_firmwaresiemens : 6gk5748-1fc00-0aa0_firmwaresiemens : 6gk5748-1fc00-0ab0_firmwaresiemens : 6gk5748-1gd00-0aa0_firmwaresiemens : 6gk5748-1gd00-0ab0_firmwaresiemens : 6gk5761-1fc00-0aa0_firmwaresiemens : 6gk5761-1fc00-0ab0_firmwaresiemens : 6gk5774-1fx00-0aa0_firmwaresiemens : 6gk5774-1fx00-0aa6_firmwaresiemens : 6gk5774-1fx00-0ab0_firmwaresiemens : 6gk5774-1fx00-0ab6_firmwaresiemens : 6gk5774-1fy00-0ta0_firmwaresiemens : 6gk5774-1fy00-0tb0_firmwaresiemens : 6gk5778-1gy00-0ta0_firmwaresiemens : 6gk5778-1gy00-0tb0_firmwaresiemens : 6gk5786-1fc00-0aa0_firmwaresiemens : 6gk5786-1fc00-0ab0_firmwaresiemens : 6gk5786-2fc00-0aa0_firmwaresiemens : 6gk5786-2fc00-0ab0_firmwaresiemens : 6gk5786-2fc00-0ac0_firmwaresiemens : 6gk5786-2hc00-0aa0_firmwaresiemens : 6gk5786-2hc00-0ab0_firmwaresiemens : 6gk5788-1fc00-0aa0_firmwaresiemens : 6gk5788-1fc00-0ab0_firmwaresiemens : 6gk5788-1gd00-0aa0_firmwaresiemens : 6gk5788-1gd00-0ab0_firmwaresiemens : 6gk5788-2fc00-0aa0_firmwaresiemens : 6gk5788-2fc00-0ab0_firmwaresiemens : 6gk5788-2fc00-0ac0_firmwaresiemens : 6gk5788-2gd00-0aa0_firmwaresiemens : 6gk5788-2gd00-0ab0_firmwaresiemens : 6gk5788-2gd00-0ta0_firmwaresiemens : 6gk5788-2gd00-0tb0_firmwaresiemens : 6gk5788-2gd00-0tc0_firmware

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2020-26141 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com