// For flags

CVE-2019-9502

Broadcom wl driver is vulnerable to heap buffer overflow

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

El controlador Broadcom wl WiFi es vulnerable a un desbordamiento del búfer de la pila. Si la longitud de los datos del elemento de información de proveedor es mayor que 164 bytes, un desbordamiento del búfer de la pila es desencadenado en la función wlc_wpa_plumb_gtk. En el peor de los casos, mediante el envío de paquetes WiFi especialmente diseñados, un atacante remoto no autenticado puede ejecutar código arbitrario en un sistema vulnerable. Más comúnmente, esta vulnerabilidad resultará en condiciones de denegación de servicio.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-03-01 CVE Reserved
  • 2020-02-03 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-122: Heap-based Buffer Overflow
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Broadcom
Search vendor "Broadcom"
Bcm4339 Firmware
Search vendor "Broadcom" for product "Bcm4339 Firmware"
--
Affected
in Broadcom
Search vendor "Broadcom"
Bcm4339
Search vendor "Broadcom" for product "Bcm4339"
--
Safe
Synology
Search vendor "Synology"
Router Manager
Search vendor "Synology" for product "Router Manager"
1.2
Search vendor "Synology" for product "Router Manager" and version "1.2"
-
Affected