Unknown
CVE-2020-26141
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2020-26141
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- alfa,
- cisco,
- siemens
Products
- 6gk5721-1fc00-0aa0 firmware -,
- 6gk5721-1fc00-0ab0 firmware -,
- 6gk5722-1fc00-0aa0 firmware -,
- 6gk5722-1fc00-0ab0 firmware -,
- 6gk5722-1fc00-0ac0 firmware -,
- 6gk5734-1fx00-0aa0 firmware -,
- 6gk5734-1fx00-0aa6 firmware -,
- 6gk5734-1fx00-0ab0 firmware -,
- 6gk5734-1fx00-0ab6 firmware -,
- 6gk5738-1gy00-0aa0 firmware -,
- 6gk5738-1gy00-0ab0 firmware -,
- 6gk5748-1fc00-0aa0 firmware -,
- 6gk5748-1fc00-0ab0 firmware -,
- 6gk5748-1gd00-0aa0 firmware -,
- 6gk5748-1gd00-0ab0 firmware -,
- 6gk5761-1fc00-0aa0 firmware -,
- 6gk5761-1fc00-0ab0 firmware -,
- 6gk5774-1fx00-0aa0 firmware -,
- 6gk5774-1fx00-0aa6 firmware -,
- 6gk5774-1fx00-0ab0 firmware -,
- 6gk5774-1fx00-0ab6 firmware -,
- 6gk5774-1fy00-0ta0 firmware -,
- 6gk5774-1fy00-0tb0 firmware -,
- 6gk5778-1gy00-0aa0 firmware -,
- 6gk5778-1gy00-0ab0 firmware -,
- 6gk5778-1gy00-0ta0 firmware -,
- 6gk5778-1gy00-0tb0 firmware -,
- 6gk5786-1fc00-0aa0 firmware -,
- 6gk5786-1fc00-0ab0 firmware -,
- 6gk5786-2fc00-0aa0 firmware -,
- 6gk5786-2fc00-0ab0 firmware -,
- 6gk5786-2fc00-0ac0 firmware -,
- 6gk5786-2hc00-0aa0 firmware -,
- 6gk5786-2hc00-0ab0 firmware -,
- 6gk5788-1fc00-0aa0 firmware -,
- 6gk5788-1fc00-0ab0 firmware -,
- 6gk5788-1gd00-0aa0 firmware -,
- 6gk5788-1gd00-0ab0 firmware -,
- 6gk5788-2fc00-0aa0 firmware -,
- 6gk5788-2fc00-0ab0 firmware -,
- 6gk5788-2fc00-0ac0 firmware -,
- 6gk5788-2gd00-0aa0 firmware -,
- 6gk5788-2gd00-0ab0 firmware -,
- 6gk5788-2gd00-0ta0 firmware -,
- 6gk5788-2gd00-0tb0 firmware -,
- 6gk5788-2gd00-0tc0 firmware -,
- awus036h firmware 6.1316.1209,
- ip conference phone 8832 firmware,
- ip phone 6861 firmware,
- ip phone 8861 firmware,
- ip phone 8865 firmware,
- meraki gr10 firmware,
- meraki gr60 firmware,
- meraki mr12 firmware,
- meraki mr18 firmware,
- meraki mr20 firmware,
- meraki mr26 firmware,
- meraki mr30h firmware,
- meraki mr32 firmware,
- meraki mr33 firmware,
- meraki mr34 firmware,
- meraki mr36 firmware,
- meraki mr42 firmware,
- meraki mr42e firmware,
- meraki mr44 firmware,
- meraki mr45 firmware,
- meraki mr46 firmware,
- meraki mr46e firmware,
- meraki mr52 firmware,
- meraki mr53 firmware,
- meraki mr53e firmware,
- meraki mr55 firmware,
- meraki mr56 firmware,
- meraki mr62 firmware,
- meraki mr66 firmware,
- meraki mr70 firmware,
- meraki mr72 firmware,
- meraki mr74 firmware,
- meraki mr76 firmware,
- meraki mr84 firmware,
- meraki mr86 firmware,
- meraki mx64w firmware,
- meraki mx65w firmware,
- meraki mx67cw firmware,
- meraki mx67w firmware,
- meraki mx68cw firmware,
- meraki mx68w firmware,
- meraki z3 firmware,
- meraki z3c firmware,
- webex board series firmware,
- webex desk series firmware,
- webex room series firmware,
- webex wireless phone 840 firmware,
- webex wireless phone 860 firmware,
- wireless ip phone 8821 firmware
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: