CVE-2020-24588

Source
https://cve.org/CVERecord?id=CVE-2020-24588
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-24588.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-24588
Downstream
Related
Published
2021-05-11T20:15:08.613Z
Modified
2026-03-15T22:35:01.263714Z
Severity
  • 3.5 (Low) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

References

Affected packages

Git / github.com/vanhoefm/fragattacks

Affected ranges

Type
GIT
Repo
https://github.com/vanhoefm/fragattacks
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "r2-sp1"
        }
    ]
}

Affected versions

Other
aosp-jb-start
aosp-kk-from-upstream
hostap-1-bp
hostap_0_6_3
hostap_0_6_4
hostap_0_6_5
hostap_0_6_6
hostap_0_6_7
hostap_0_7_0
hostap_0_7_1
hostap_0_7_2
hostap_2_0
hostap_2_1

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "20h2"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "1607"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "1803"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "1809"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "1909"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "2004"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "2004"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "9.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "4.4.0"
            },
            {
                "fixed": "4.4.271"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "4.9.0"
            },
            {
                "fixed": "4.9.271"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "4.14"
            },
            {
                "fixed": "4.14.235"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "4.19"
            },
            {
                "fixed": "4.19.193"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.4"
            },
            {
                "fixed": "5.4.124"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.10"
            },
            {
                "fixed": "5.10.42"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.12"
            },
            {
                "fixed": "5.12.9"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-24588.json"