7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:P/I:N/A:C
0.006 Low
EPSS
Percentile
78.8%
Severity: Medium
Date : 2020-12-09
CVE-ID : CVE-2020-12695
Package : hostapd
Type : proxy injection
Remote : Yes
Link : https://security.archlinux.org/AVG-1322
The package hostapd before version 2.9-4 is vulnerable to proxy
injection.
Upgrade to 2.9-4.
The problem has been fixed upstream but no release is available yet.
None.
The Open Connectivity Foundation UPnP specification before 2020-04-17
does not forbid the acceptance of a subscription request with a
delivery URL on a different network segment than the fully qualified
event-subscription URL, aka the CallStranger issue. This issue could
allow a device connected to the local network (i.e., a device that has
been authorized to transmit packets in the network in which the AP is
located) to trigger the AP to initiate a HTTP (TCP/IP) connection to an
arbitrary URL, including connections to servers in external networks.
An attacker on the local network might be able to force the AP to
initiate a HTTP (TCP/IP) connection to an arbitrary URL, including
connections to servers in external networks.
https://bugs.archlinux.org/task/68861
https://w1.fi/security/2020-1/upnp-subscribe-misbehavior-wps-ap.txt
http://www.callstranger.com/
https://w1.fi/security/2020-1/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch
https://w1.fi/security/2020-1/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch
https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
https://security.archlinux.org/CVE-2020-12695
www.callstranger.com/
bugs.archlinux.org/task/68861
security.archlinux.org/AVG-1322
security.archlinux.org/CVE-2020-12695
w1.fi/security/2020-1/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch
w1.fi/security/2020-1/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch
w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
w1.fi/security/2020-1/upnp-subscribe-misbehavior-wps-ap.txt
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:P/I:N/A:C
0.006 Low
EPSS
Percentile
78.8%