Wi-Fi Enabled Devices Could Allow for Data Exfiltration
by CIRT Team
DESCRIPTION:
Multiple vulnerabilities have been discovered in Wi-Fi enabled devices,
the most severe of which could allow for data exfiltration. IEEE 802.11
is part of the IEEE 802 set of local area network technical standards,
and specifies the set of medium access control and physical layer
protocols for implementing wireless local area network communication.
Successful exploitation of the most severe of these vulnerabilities
could allow an attacker to exfiltrate user data.
IMPACT:
* Any Wi-Fi enabled device could be vulnerable, please check with the
manufacturer of your device(s)
SYSTEM AFFECTED:
Multiple vulnerabilities have been discovered in Wi-Fi enabled devices,
the most severe of which could allow for data exfiltration. These
vulnerabilities can be exploited if a user connects to a rogue access
point and is then redirected to or visits a malicious server. Details of
the vulnerabilities are as follows:
* A vulnerability exists in the 802.11 standard that underpins Wi-Fi
Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy
(WEP) that could allow an attacker to inject arbitrary network packets
(CVE-2020-24588)
* A vulnerability exists in the 802.11 standard that underpins Wi-Fi
Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy
(WEP) that could allow an attacker to decrypt selected fragments when
another device sends fragmented frames. (CVE-2020-24587)
* A vulnerability exists in the 802.11 standard that underpins Wi-Fi
Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy
(WEP) that could allow an attacker to inject arbitrary network packets
and/or exfiltrate user data. (CVE-2020-24586)
* A vulnerability exists in Samsung Galaxy S3 i9305 4.4.4 devices that
could allow an attacker to inject arbitrary network packets independent
of the network configuration. (CVE-2020-26145)
* A vulnerability exists in Samsung Galaxy S3 i9305 4.4.4 devices that
could allow an attacker to inject arbitrary network packets independent
of the network configuration. (CVE-2020-26144)
* A vulnerability exists in the ALFA Windows 10 driver 6.1316.1209 for
AWUS036H that could allow an attacker to inject arbitrary data frames
independent of the network configuration. (CVE-2020-26140)
* A vulnerability exists in the ALFA Windows 10 driver 1030.36.604 for
AWUS036ACH could allow an attacker to inject arbitrary data frames
independent of the network configuration. (CVE-2020-26143)
* A vulnerability exists in the kernel in NetBSD 7.1 that could allow an
attacker to launch denial-of-service attacks against connected clients
and makes it easier to exploit other vulnerabilities in connected
clients. (CVE-2020-26139)
* A vulnerability exists in Samsung Galaxy S3 i9305 4.4.4 devices that
could allow an attacker to exfiltrate selected fragments. (CVE-2020-26146)
* A vulnerability exists in the Linux kernel 5.8.9 that could allow an
attacker to inject packets and/or exfiltrate selected fragments
(CVE-2020-26147)
* A vulnerability exists in the kernel in OpenBSD 6.6 that could allow
an attacker to inject arbitrary network packets, independent of the
network configuration. (CVE-2020-26142)
* A vulnerability exists in the ALFA Windows 10 driver 6.1316.1209 for
AWUS036H that could allow an attacker to inject and possibly decrypt
packets. (CVE-2020-26141)
Successful exploitation of the most severe of these vulnerabilities
could allow an attacker to exfiltrate of user data.
RECOMMENDATIONS:
We recommend the following actions be taken:
* Apply the stable channel update provided by the vendor to vulnerable
systems immediately after appropriate testing.
* Remind users not to visit un-trusted websites or follow links provided
by unknown or un-trusted sources.
* Inform and educate users regarding the threats posed by hypertext
links contained in emails or attachments especially from un-trusted sources.
REFERENCES:
https://www.wi-fi.org/security-update-fragmentation
https://secure-web.cisco.com/1VVLe7fXIAAxKLWG_Fd0ubn6de9BTrOLPF77k05RJa_Ly0ktcQzjVgmTmEF0wbtDN-Vzrd6Re0JX5nZrduJozN0varcKn7RpHn0iUM_F9Zyv4Z4fmes3i0HSGZxfPrszzhActzqXPbp6BaXcbtZ-l7pcOfBk10ONuwytRn3J0qxsXsUeav1UrfgHIhYwkFT2B7AnF6LzaRH_wcVENPxC0pe4s2KzRW6PRTk9lLS7jJOXq2wid_MVJs1rHppOSQ2Yi/https%3A%2F%2Fwww.fragattacks.com%2F%23beingexploit
Recommended Posts
Active Exploitation of Critical F5 BIG – IP Vulnerability (CVE–2023-46747) Uncovered in Bangladesh
06 Nov 2024 - Security Advisories & Alerts