Lucene search

K
cvelistMitreCVELIST:CVE-2020-24588
HistoryMay 11, 2021 - 12:00 a.m.

CVE-2020-24588

2021-05-1100:00:00
mitre
www.cve.org
8
wi-fi
wpa
wpa2
wpa3
wired equivalent privacy
network packet injection
vulnerability

AI Score

6.8

Confidence

Low

EPSS

0.003

Percentile

70.7%

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn’t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.