CPE matches: cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:* && versionEndExcluding=10.0.1-31
Description
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.
Damage
- Complete loss of protection.
Attack conditions
- Attacking requires physical proximity to the network and can be done by anyone (requires no authentication).
- No user interaction is required.
Damage and attack conditions obtained from CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N (CVSSv3)
Type of bug(s)
- CWE-20, Improper Input Validation:
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
References
CPE matches: cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:* && versionEndExcluding=10.0.1-31
Description
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
Damage
- Complete loss of protection.
Attack conditions
- Attacking requires physical proximity to the network and can be done by anyone (requires no authentication).
- No user interaction is required.
- The attack is estimated to have a high success rate, once attempted.
Damage and attack conditions obtained from CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N (CVSSv3)
Type of bug(s)
- CWE-20, Improper Input Validation:
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
References
CPE matches: cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:* && versionEndExcluding=10.0.1-31
Description
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
Damage
- Limited access to information.
Attack conditions
- Attacking requires physical proximity to the network and can be done by anyone (requires no authentication).
- Human user action interaction is required for the attack.
- The attack is estimated to have a high success rate, once attempted.
Damage and attack conditions obtained from CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N (CVSSv3)
References