// For flags

CVE-2019-18991

 

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A partial authentication bypass vulnerability exists on Atheros AR9132 3.60(AMX.8), AR9283 1.85, and AR9285 1.0.0.12NA devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.

Se presenta una vulnerabilidad de omisión de autenticación parcial en los dispositivos Atheros AR9132 versión 3.60(AMX.8), AR9283 versión 1.85 y AR9285 versión 1.0.0.12NA. La vulnerabilidad permite enviar una trama de datos no cifrada hacia un enrutador WLAN protegido por WPA2 donde el paquete se enruta por medio de la red. Si tiene éxito, es enviada una respuesta como una trama cifrada, lo que permitiría a un atacante discernir información o potencialmente modificar datos

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-11-15 CVE Reserved
  • 2020-09-30 CVE Published
  • 2023-06-16 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-290: Authentication Bypass by Spoofing
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Qualcomm
Search vendor "Qualcomm"
Atheros Ar9132 Firmware
Search vendor "Qualcomm" for product "Atheros Ar9132 Firmware"
3.60\(amx.8\)
Search vendor "Qualcomm" for product "Atheros Ar9132 Firmware" and version "3.60\(amx.8\)"
-
Affected
in Qualcomm
Search vendor "Qualcomm"
Atheros Ar9132
Search vendor "Qualcomm" for product "Atheros Ar9132"
--
Safe
Qualcomm
Search vendor "Qualcomm"
Atheros Ar9283 Firmware
Search vendor "Qualcomm" for product "Atheros Ar9283 Firmware"
1.85
Search vendor "Qualcomm" for product "Atheros Ar9283 Firmware" and version "1.85"
-
Affected
in Qualcomm
Search vendor "Qualcomm"
Atheros Ar9283
Search vendor "Qualcomm" for product "Atheros Ar9283"
--
Safe
Qualcomm
Search vendor "Qualcomm"
Atheros Ar9285 Firmware
Search vendor "Qualcomm" for product "Atheros Ar9285 Firmware"
1.0.0.12na
Search vendor "Qualcomm" for product "Atheros Ar9285 Firmware" and version "1.0.0.12na"
-
Affected
in Qualcomm
Search vendor "Qualcomm"
Atheros Ar9285
Search vendor "Qualcomm" for product "Atheros Ar9285"
--
Safe