CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:H/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
EPSS
Percentile
41.3%
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn’t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
Vendor | Product | Version | CPE |
---|---|---|---|
ieee | ieee_802.11 | * | cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:* |
linux | mac80211 | - | cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:* |
debian | debian_linux | 9.0 | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
arista | c-100_firmware | - | cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:* |
arista | c-100 | - | cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:* |
arista | c-110_firmware | - | cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:* |
arista | c-110 | - | cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:* |
arista | c-120_firmware | - | cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:* |
arista | c-120 | - | cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:* |
arista | c-130_firmware | - | cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:* |
www.openwall.com/lists/oss-security/2021/05/11/12
github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
lists.debian.org/debian-lts-announce/2021/06/msg00019.html
lists.debian.org/debian-lts-announce/2021/06/msg00020.html
lists.debian.org/debian-lts-announce/2023/04/msg00002.html
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
www.fragattacks.com
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:H/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
EPSS
Percentile
41.3%