// For flags

CVE-2020-26147

kernel: reassembling mixed encrypted/plaintext fragments

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

Se detectó un problema en el kernel de Linux versión 5.8.9. Las implementaciones de WEP, WPA, WPA2 y WPA3 reensamblan fragmentos aunque algunos de ellos se enviaron en texto plano. Esta vulnerabilidad puede ser abusada para inyectar paquetes y/o exfiltrar fragmentos seleccionados cuando otro dispositivo envía tramas fragmentadas y el protocolo de confidencialidad de datos WEP, CCMP o GCMP es usado

A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel's WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None
Attack Vector
Adjacent
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-09-29 CVE Reserved
  • 2021-05-11 CVE Published
  • 2024-07-12 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-307: Improper Restriction of Excessive Authentication Attempts
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Arista
Search vendor "Arista"
C-75 Firmware
Search vendor "Arista" for product "C-75 Firmware"
--
Affected
in Arista
Search vendor "Arista"
C-75
Search vendor "Arista" for product "C-75"
--
Safe
Arista
Search vendor "Arista"
O-90 Firmware
Search vendor "Arista" for product "O-90 Firmware"
--
Affected
in Arista
Search vendor "Arista"
O-90
Search vendor "Arista" for product "O-90"
--
Safe
Arista
Search vendor "Arista"
C-65 Firmware
Search vendor "Arista" for product "C-65 Firmware"
--
Affected
in Arista
Search vendor "Arista"
C-65
Search vendor "Arista" for product "C-65"
--
Safe
Arista
Search vendor "Arista"
W-68 Firmware
Search vendor "Arista" for product "W-68 Firmware"
--
Affected
in Arista
Search vendor "Arista"
W-68
Search vendor "Arista" for product "W-68"
--
Safe
Siemens
Search vendor "Siemens"
Scalance W700 Ieee 802.11n Firmware
Search vendor "Siemens" for product "Scalance W700 Ieee 802.11n Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Scalance W700 Ieee 802.11n
Search vendor "Siemens" for product "Scalance W700 Ieee 802.11n"
--
Safe
Siemens
Search vendor "Siemens"
Scalance W1700 Ieee 802.11ac Firmware
Search vendor "Siemens" for product "Scalance W1700 Ieee 802.11ac Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Scalance W1700 Ieee 802.11ac
Search vendor "Siemens" for product "Scalance W1700 Ieee 802.11ac"
--
Safe
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.4 < 4.4.271
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.4 < 4.4.271"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.9 < 4.9.271
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.9 < 4.9.271"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.14 < 4.14.235
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.14 < 4.14.235"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.19 < 4.19.193
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.19 < 4.19.193"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.4 < 5.4.124
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.4 < 5.4.124"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.10 < 5.10.42
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.10 < 5.10.42"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.12 < 5.12.9
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.12 < 5.12.9"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected