CVE-2020-26144
MEDIUMSamsung Galaxy I9305 Firmware < 10.0.1-31 - Improper Input Validation
Title source: ruleDescription
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
x_refsource_cisco
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
Third Party Advisory x_refsource_misc
https://www.fragattacks.com
Third Party Advisory x_refsource_misc
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2021/05/11/12
Third Party Advisory x_refsource_confirm
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
Third Party Advisory x_refsource_misc
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-019200.html
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-913875.html
Scores
CVSS v3
6.5
EPSS
0.0052
EPSS Percentile
67.0%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-20
Status
published
Products (18)
arista/c-100_firmware
< 11.0.0-36
arista/c-110_firmware
< 11.0.0-36
arista/c-120_firmware
< 11.0.0-36
arista/c-130_firmware
< 11.0.0-36
arista/c-200_firmware
< 11.0.0-36
arista/c-230_firmware
< 10.0.1-31
arista/c-235_firmware
< 10.0.1-31
arista/c-250_firmware
< 10.0.1-31
arista/c-260_firmware
< 10.0.1-31
arista/c-65_firmware
... and 8 more
Published
May 11, 2021
Tracked Since
Feb 18, 2026