CVE-2020-26143
MEDIUMAlfa Awus036h Firmware - Improper Input Validation
Title source: ruleDescription
An issue was discovered in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
x_refsource_cisco
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
Third Party Advisory x_refsource_misc
https://www.fragattacks.com
Third Party Advisory x_refsource_misc
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2021/05/11/12
Third Party Advisory x_refsource_confirm
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
Third Party Advisory x_refsource_misc
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-019200.html
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-913875.html
Scores
CVSS v3
6.5
EPSS
0.0040
EPSS Percentile
60.7%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-20
Status
published
Products (6)
alfa/awus036h_firmware
1030.36.604
arista/c-65_firmware
arista/c-75_firmware
arista/o-90_firmware
arista/w-68_firmware
siemens/scalance_w700_ieee_802.11n_firmware
Published
May 11, 2021
Tracked Since
Feb 18, 2026