Description
An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.
CVSS Metrics
- Vector
- CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N
- Attack Vector
- adjacent network
- Complexity
- high
- Privileges
- none
- User Action
- required
- Scope
- unchanged
- Confidentiality
- low
- Integrity
- high
- Availability
- none
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- LINUX
- Published
- 5/11/2021
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
linux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kerneldebian : debian_linuxarista : c-75_firmwarearista : o-90_firmwarearista : c-65_firmwarearista : w-68_firmwaresiemens : scalance_w700_ieee_802.11n_firmwaresiemens : scalance_w1700_ieee_802.11ac_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.