Weak Encryption Method in Wi-Fi Standards Impacts Multiple Networking Products
CVE-2020-24587

2.6LOW

Key Information:

Vendor

Ieee

Vendor
CVE Published:
11 May 2021

What is CVE-2020-24587?

The vulnerability arises from a weakness in the 802.11 standard, which governs Wi-Fi security protocols. It does not mandate that all fragments of a frame be encrypted with the same key, allowing attackers to exploit this inconsistency. By renewing encryption keys periodically, an adversary can selectively decrypt certain fragments of information sent over the network. This could lead to unauthorized access and data interception during fragmented transmission, affecting the security of interactions over WPA, WPA2, and WEP. Users of affected devices should prioritize updates and patches to mitigate potential risks.

References

CVSS V3.1

Score:
2.6
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.