Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2019-15126 — Time-of-check Time-of-use (TOCTOU) Race Condition in Apple Macos Catalina 10.15.1 Security Update 2019-001 AND Security Update 2019-006
Severity
3.1LOWNVD
EPSS
8.4%
top 7.66%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 5
Latest updateApr 16
Description
An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.
CVSS vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 1.6 | Impact: 1.4
Affected Packages7 packages
🔴Vulnerability Details
1💥Exploits & PoCs
1📋Vendor Advisories
8Microsoft▶
MITRE: CVE-2019-15126 Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device↗2023-02-14
Cisco▶
Wi-Fi Protected Network and Wi-Fi Protected Network 2 Information Disclosure Vulnerability↗2020-02-27
Red Hat▶
linux-firmware: Transmission of data encrypted with an all-zero session key after disassociation↗2020-02-05
Apple▶
CVE-2019-15126: macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra↗2019-12-10
🕵️Threat Intelligence
5📄Research Papers
2💬Community
1Bugzilla▶
CVE-2019-15126 linux-firmware: Transmission of data encrypted with an all-zero session key after disassociation↗2020-02-27