CVE-2020-24587 — Use of a Broken or Risky Cryptographic Algorithm in Kernel
Severity
2.6LOWNVD
OSV3.5
EPSS
0.5%
top 34.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 11
Latest updateMar 14
Description
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
CVSS vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:NExploitability: 1.2 | Impact: 1.4
Affected Packages22 packages
Also affects: Debian Linux 9.0
🔴Vulnerability Details
10OSV▶
linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities↗2021-07-20
OSV▶
linux, linux-aws, linux-aws-5.8, linux-azure, linux-azure-5.8, linux-gcp, linux-gcp-5.8, linux-hwe-5.8, linux-kvm, linux-oracle, linux-oracle-5.8, linux-raspi vulnerabilities↗2021-06-23
📋Vendor Advisories
16🕵️Threat Intelligence
5Qualys▶
Microsoft & Adobe Patch Tuesday (May 2021) – Qualys covers 85 Vulnerabilities, 26 Critical↗2021-05-11