CVE-2019-18989
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A partial authentication bypass vulnerability exists on Mediatek MT7620N 1.06 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.
Se presenta una vulnerabilidad de omisión de autenticación parcial en los dispositivos Mediatek MT7620N versión 1.06. La vulnerabilidad permite enviar una trama de datos no cifrada hacia un enrutador WLAN protegido por WPA2 donde el paquete se enruta por medio de la red. Si tiene éxito, es enviado una respuesta como una trama cifrada, lo que permitiría a un atacante discernir información o potencialmente modificar datos
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-11-15 CVE Reserved
- 2020-09-30 CVE Published
- 2023-06-16 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-290: Authentication Bypass by Spoofing
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mediatek Search vendor "Mediatek" | Mt7620n Firmware Search vendor "Mediatek" for product "Mt7620n Firmware" | 1.06 Search vendor "Mediatek" for product "Mt7620n Firmware" and version "1.06" | - |
Affected
| in | Mediatek Search vendor "Mediatek" | Mt7620n Search vendor "Mediatek" for product "Mt7620n" | - | - |
Safe
|