CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:H/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N
EPSS
Percentile
53.7%
An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
debian | debian_linux | 9.0 | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
arista | c-75_firmware | - | cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:* |
arista | c-75 | - | cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:* |
arista | o-90_firmware | - | cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:* |
arista | o-90 | - | cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:* |
arista | c-65_firmware | - | cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:* |
arista | c-65 | - | cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:* |
arista | w-68_firmware | - | cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:* |
arista | w-68 | - | cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:* |
www.openwall.com/lists/oss-security/2021/05/11/12
cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
lists.debian.org/debian-lts-announce/2021/06/msg00019.html
lists.debian.org/debian-lts-announce/2021/06/msg00020.html
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
www.fragattacks.com
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:H/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N
EPSS
Percentile
53.7%