5.4 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N
6 Medium
AI Score
Confidence
High
3.2 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:H/Au:N/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
45.1%
An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.
www.openwall.com/lists/oss-security/2021/05/11/12
cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
lists.debian.org/debian-lts-announce/2021/06/msg00019.html
lists.debian.org/debian-lts-announce/2021/06/msg00020.html
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
www.fragattacks.com
More
5.4 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N
6 Medium
AI Score
Confidence
High
3.2 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:H/Au:N/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
45.1%