CVE-2020-24588

Source
https://cve.org/CVERecord?id=CVE-2020-24588
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-24588.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-24588
Downstream
Related
Published
2021-05-11T20:15:08.613Z
Modified
2026-04-16T00:02:11.463047842Z
Severity
  • 3.5 (Low) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.0"
                }
            ],
            "cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "introduced": "4.4.0"
                },
                {
                    "fixed": "4.4.271"
                },
                {
                    "introduced": "4.9.0"
                },
                {
                    "fixed": "4.9.271"
                },
                {
                    "introduced": "4.14"
                },
                {
                    "fixed": "4.14.235"
                },
                {
                    "introduced": "4.19"
                },
                {
                    "fixed": "4.19.193"
                },
                {
                    "introduced": "5.4"
                },
                {
                    "fixed": "5.4.124"
                },
                {
                    "introduced": "5.10"
                },
                {
                    "fixed": "5.10.42"
                },
                {
                    "introduced": "5.12"
                },
                {
                    "fixed": "5.12.9"
                }
            ],
            "cpe": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "1607"
                }
            ],
            "cpe": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "1803"
                }
            ],
            "cpe": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "1809"
                }
            ],
            "cpe": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "1909"
                }
            ],
            "cpe": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "2004"
                }
            ],
            "cpe": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "20h2"
                }
            ],
            "cpe": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "2004"
                }
            ],
            "cpe": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*"
        }
    ]
}
References

Affected packages

Git / github.com/vanhoefm/fragattacks

Affected ranges

Type
GIT
Repo
https://github.com/vanhoefm/fragattacks
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "r2-sp1"
        }
    ],
    "cpe": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"
}

Affected versions

Other
aosp-jb-start
aosp-kk-from-upstream
hostap-1-bp
hostap_0_6_3
hostap_0_6_4
hostap_0_6_5
hostap_0_6_6
hostap_0_6_7
hostap_0_7_0
hostap_0_7_1
hostap_0_7_2
hostap_2_0
hostap_2_1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-24588.json"