CVE-2019-9502
moderate-risk
Published 2020-02-03
The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
Do I need to act?
~
1.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.9/10
High
ADJACENT_NETWORK
/ HIGH complexity
Affected Products (2)
Bcm4339 Firmware
References (4)
Third Party Advisory
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
Third Party Advisory
https://kb.cert.org/vuls/id/166939/
Third Party Advisory
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
Third Party Advisory
https://kb.cert.org/vuls/id/166939/
32
/ 100
moderate-risk
Severity
21/34 · High
Exploitability
4/34 · Minimal
Exposure
7/34 · Low