// For flags

CVE-2019-18990

 

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A partial authentication bypass vulnerability exists on Realtek RTL8812AR 1.21WW, RTL8196D 1.0.0, RTL8192ER 2.10, and RTL8881AN 1.09 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.

Se presenta una vulnerabilidad de omisión de autenticación parcial en los dispositivos Realtek RTL8812AR versión 1.21WW, RTL8196D versión 1.0.0, RTL8192ER versión 2.10 y RTL8881AN versión 1.09. La vulnerabilidad permite enviar una trama de datos no cifrada hacia un enrutador WLAN protegido por WPA2 donde el paquete se enruta por medio de la red. Si tiene éxito, es enviada una respuesta como una trama cifrada, lo que permitiría a un atacante discernir información o potencialmente modificar datos

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-11-15 CVE Reserved
  • 2020-09-30 CVE Published
  • 2023-06-16 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-290: Authentication Bypass by Spoofing
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Realtek
Search vendor "Realtek"
Rtl8812ar Firmware
Search vendor "Realtek" for product "Rtl8812ar Firmware"
1.21ww
Search vendor "Realtek" for product "Rtl8812ar Firmware" and version "1.21ww"
-
Affected
in Realtek
Search vendor "Realtek"
Rtl8812ar
Search vendor "Realtek" for product "Rtl8812ar"
--
Safe
Realtek
Search vendor "Realtek"
Rtl8196d Firmware
Search vendor "Realtek" for product "Rtl8196d Firmware"
1.0.0
Search vendor "Realtek" for product "Rtl8196d Firmware" and version "1.0.0"
-
Affected
in Realtek
Search vendor "Realtek"
Rtl8196d
Search vendor "Realtek" for product "Rtl8196d"
--
Safe
Realtek
Search vendor "Realtek"
Rtl8192er Firmware
Search vendor "Realtek" for product "Rtl8192er Firmware"
2.10
Search vendor "Realtek" for product "Rtl8192er Firmware" and version "2.10"
-
Affected
in Realtek
Search vendor "Realtek"
Rtl8192er
Search vendor "Realtek" for product "Rtl8192er"
--
Safe
Realtek
Search vendor "Realtek"
Rtl8881an Firmware
Search vendor "Realtek" for product "Rtl8881an Firmware"
1.09
Search vendor "Realtek" for product "Rtl8881an Firmware" and version "1.09"
-
Affected
in Realtek
Search vendor "Realtek"
Rtl8881an
Search vendor "Realtek" for product "Rtl8881an"
--
Safe