Lucene search

K
cve[email protected]CVE-2019-18991
HistorySep 30, 2020 - 6:15 p.m.

CVE-2019-18991

2020-09-3018:15:17
CWE-290
web.nvd.nist.gov
26
cve-2019-18991
vulnerability
authentication bypass
atheros ar9132
atheros ar9283
atheros ar9285
wlan
wpa2
encryption

5.4 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

5.4 Medium

AI Score

Confidence

High

4.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:A/AC:L/Au:N/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

24.7%

A partial authentication bypass vulnerability exists on Atheros AR9132 3.60(AMX.8), AR9283 1.85, and AR9285 1.0.0.12NA devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.

Affected configurations

NVD
Node
qualcommatheros_ar9132_firmwareMatch3.60\(amx.8\)
AND
qualcommatheros_ar9132Match-
Node
qualcommatheros_ar9283_firmwareMatch1.85
AND
qualcommatheros_ar9283Match-
Node
qualcommatheros_ar9285_firmwareMatch1.0.0.12na
AND
qualcommatheros_ar9285Match-

5.4 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

5.4 Medium

AI Score

Confidence

High

4.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:A/AC:L/Au:N/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

24.7%

Related for CVE-2019-18991