CVE-2019-9502 — Heap-based Buffer Overflow in Wifi Drivers
Severity
8.8HIGHNVD
CNA7.9
EPSS
1.4%
top 19.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 3
Latest updateMay 24
Description
The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
CVSS vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
3GHSA
▶
OSV▶
CVE-2019-9502: In driver/firmware of broadcom wifi chipset, there is a possible out of bounds write due to a missing bounds check↗2020-07-01
💥Exploits & PoCs
1Exploit-DB
▶
📋Vendor Advisories
2💬Community
1Bugzilla▶
CVE-2019-15126 linux-firmware: Transmission of data encrypted with an all-zero session key after disassociation↗2020-02-27