The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| ieee | ieee_802.11 | - | - |
| debian | debian_linux | - | - |
| linux | mac80211 | - |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
30
Affected Products
18
References
ieee / ieee_802.11
| - |
| arista | c-250_firmware | 10.0.1-31 | - |
| arista | c-260_firmware | 10.0.1-31 | - |
| arista | c-230_firmware | 10.0.1-31 | - |
| arista | c-235_firmware | 10.0.1-31 | - |
| arista | c-200_firmware | 11.0.0-36 | - |
| intel | ax210_firmware | 22.30.0.11 | - |
| intel | ax201_firmware | 22.30.0.11 | - |
| intel | ax200_firmware | 22.30.0.11 | - |
| intel | ac_9560_firmware | 22.30.0.11 | - |
| intel | ac_9462_firmware | 22.30.0.11 | - |
| intel | ac_9461_firmware | 22.30.0.11 | - |
| intel | ac_9260_firmware | 22.30.0.11 | - |
| intel | ac_8265_firmware | 20.70.21.2 | - |
| intel | ac_8260_firmware | 20.70.21.2 | - |
| intel | ac_3168_firmware | 19.51.33.1 | - |
| intel | ac_7265_firmware | 19.51.33.1 | - |
| intel | ac_3165_firmware | 19.51.33.1 | - |
| intel | ax1675_firmware | - | - |
| intel | ax1650_firmware | - | - |
| intel | ac_1550_firmware | - | - |
| linux | linux_kernel | 4.4 - 4.4.271 | - |
| linux | linux_kernel | 4.9 - 4.9.271 | - |
| linux | linux_kernel | 4.14 - 4.14.235 | - |
| linux | linux_kernel | 4.19 - 4.19.193 | - |
| linux | linux_kernel | 5.4 - 5.4.124 | - |
| linux | linux_kernel | 5.10 - 5.10.42 | - |
| linux | linux_kernel | 5.12 - 5.12.9 | - |
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Exploitability
Impact