Description
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References (10)
Core 10
Core References
Third Party Advisory vendor-advisory
x_refsource_cisco
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
Third Party Advisory x_refsource_misc
https://www.fragattacks.com
Third Party Advisory x_refsource_misc
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2021/05/11/12
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
Patch, Third Party Advisory x_refsource_confirm
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
Third Party Advisory x_refsource_misc
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-019200.html
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-913875.html
Scores
CVSS v3
5.3
EPSS
0.0225
EPSS Percentile
84.7%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-287
Status
published
Products (50)
arista/c-100_firmware
arista/c-110_firmware
arista/c-120_firmware
arista/c-130_firmware
arista/c-200_firmware
arista/c-230_firmware
arista/c-235_firmware
arista/c-250_firmware
arista/c-260_firmware
arista/c-65_firmware
... and 40 more
Published
May 11, 2021
Tracked Since
Feb 18, 2026