CVE-2020-26139

MEDIUM

Netbsd - Authentication Bypass

Title source: rule
STIX 2.1

Description

An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.

References (10)

Core 10
Core References
Third Party Advisory x_refsource_misc
https://www.fragattacks.com
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2021/05/11/12
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
Patch, Third Party Advisory x_refsource_confirm
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf

Scores

CVSS v3 5.3
EPSS 0.0225
EPSS Percentile 84.7%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-287
Status published
Products (50)
arista/c-100_firmware
arista/c-110_firmware
arista/c-120_firmware
arista/c-130_firmware
arista/c-200_firmware
arista/c-230_firmware
arista/c-235_firmware
arista/c-250_firmware
arista/c-260_firmware
arista/c-65_firmware
... and 40 more
Published May 11, 2021
Tracked Since Feb 18, 2026