CVE-2020-26142
low-risk
Published 2021-05-11
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
Do I need to act?
~
1.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (10)
Third Party Advisory
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-w...
Third Party Advisory
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-s...
Third Party Advisory
https://www.fragattacks.com
Third Party Advisory
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-w...
Third Party Advisory
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-s...
Third Party Advisory
https://www.fragattacks.com
26
/ 100
low-risk
Severity
17/34 · Moderate
Exploitability
4/34 · Minimal
Exposure
5/34 · Minimal