CVE-2020-24588

3.5 LOW
Published: May 11, 2021 Modified: April 14, 2026
View on NVD

Description

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/05/11/12
Source: cve@mitre.org
Mailing List Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
Source: cve@mitre.org
Third Party Advisory
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
Source: cve@mitre.org
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
Source: cve@mitre.org
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
Source: cve@mitre.org
Mailing List Third Party Advisory
https://www.fragattacks.com
Source: cve@mitre.org
Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/05/11/12
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.fragattacks.com
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://cert-portal.siemens.com/productcert/html/ssa-019200.html
Source: 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
https://cert-portal.siemens.com/productcert/html/ssa-913875.html
Source: 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e

22 reference(s) from NVD

Quick Stats

CVSS v3 Score
3.5 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

intel ieee siemens microsoft linux debian arista cisco