CVE-2020-26146
MEDIUMSamsung Galaxy I9305 Firmware < 10.0.1-31 - Improper Input Validation
Title source: ruleDescription
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
x_refsource_cisco
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
Third Party Advisory x_refsource_misc
https://www.fragattacks.com
Third Party Advisory x_refsource_misc
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2021/05/11/12
Third Party Advisory x_refsource_confirm
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
Third Party Advisory x_refsource_misc
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-019200.html
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-913875.html
Scores
CVSS v3
5.3
EPSS
0.0057
EPSS Percentile
68.6%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-20
Status
published
Products (19)
arista/c-100_firmware
< 11.0.0-36
arista/c-110_firmware
< 11.0.0-36
arista/c-120_firmware
< 11.0.0-36
arista/c-130_firmware
< 11.0.0-36
arista/c-200_firmware
< 11.0.0-36
arista/c-230_firmware
< 10.0.1-31
arista/c-235_firmware
< 10.0.1-31
arista/c-250_firmware
< 10.0.1-31
arista/c-260_firmware
< 10.0.1-31
arista/c-65_firmware
... and 9 more
Published
May 11, 2021
Tracked Since
Feb 18, 2026