Show filters
74 Total Results
Displaying 61-70 of 74
Sort by:
Attacker Value
Unknown
CVE-2020-26140
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
0
Attacker Value
Unknown
CVE-2020-26139
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
0
Attacker Value
Unknown
CVE-2020-24588
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
0
Attacker Value
Unknown
CVE-2020-24586
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
0
Attacker Value
Unknown
CVE-2020-0569
Disclosure Date: November 23, 2020 (last updated February 22, 2025)
Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
0
Attacker Value
Unknown
CVE-2020-12321
Disclosure Date: November 12, 2020 (last updated November 28, 2024)
Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
0
Attacker Value
Unknown
CVE-2020-12322
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Improper input validation in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
0
Attacker Value
Unknown
CVE-2020-0555
Disclosure Date: August 13, 2020 (last updated February 21, 2025)
Improper input validation for some Intel(R) Wireless Bluetooth(R) products may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2020-0554
Disclosure Date: August 13, 2020 (last updated February 21, 2025)
Race condition in software installer for some Intel(R) Wireless Bluetooth(R) products on Windows* 7, 8.1 and 10 may allow an unprivileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2020-0553
Disclosure Date: August 13, 2020 (last updated February 21, 2025)
Out-of-bounds read in kernel mode driver for some Intel(R) Wireless Bluetooth(R) products on Windows* 10, may allow a privileged user to potentially enable information disclosure via local access.
0