Lucene search

K

Ieee Security Vulnerabilities

cve
cve

CVE-2004-0459

The Clear Channel Assessment (CCA) algorithm in the IEEE 802.11 wireless protocol, when using DSSS transmission encoding, allows remote attackers to cause a denial of service via a certain RF signal that causes a channel to appear busy (aka "jabber"), which prevents devices from transmitting data.

6.7AI Score

0.096EPSS

2004-07-07 04:00 AM
32
cve
cve

CVE-2004-1038

A design error in the IEEE1394 specification allows attackers with physical access to a device to read and write to sensitive memory using a modified FireWire/IEEE 1394 client, thus bypassing intended restrictions that would normally require greater degrees of physical access to exploit. NOTE: this...

6.1AI Score

0.002EPSS

2005-03-01 05:00 AM
27
cve
cve

CVE-2020-24586

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted u...

3.5CVSS

6.2AI Score

0.002EPSS

2021-05-11 08:15 PM
304
7
cve
cve

CVE-2020-24587

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames an...

2.6CVSS

6.2AI Score

0.001EPSS

2021-05-11 08:15 PM
364
In Wild
8
cve
cve

CVE-2020-24588

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802...

3.5CVSS

6.4AI Score

0.003EPSS

2021-05-11 08:15 PM
448
9
cve
cve

CVE-2021-27853

Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.

4.7CVSS

4.8AI Score

0.001EPSS

2022-09-27 06:15 PM
76
4
cve
cve

CVE-2021-27854

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.

4.7CVSS

4.7AI Score

0.001EPSS

2022-09-27 07:15 PM
54
6
cve
cve

CVE-2021-27861

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers)

4.7CVSS

4.8AI Score

0.001EPSS

2022-09-27 07:15 PM
44
6
cve
cve

CVE-2021-27862

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).

4.7CVSS

4.7AI Score

0.001EPSS

2022-09-27 07:15 PM
81
6
cve
cve

CVE-2022-47522

The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication ...

7.5CVSS

6.5AI Score

0.001EPSS

2023-04-15 02:15 AM
57