Buffer Overflow Vulnerability in Realtek RTL8195A Wi-Fi Module
CVE-2020-25854

8.1HIGH

Key Information:

Vendor

Realtek

Vendor
CVE Published:
3 February 2021

What is CVE-2020-25854?

The Realtek RTL8195A Wi-Fi Module has a vulnerability in the DecWPA2KeyData() function that fails to validate the size parameter in its internal functions, leading to a stack buffer overflow. This vulnerability can be exploited by an attacker impersonating an Access Point, enabling them to inject specially crafted packets into the WPA2 handshake process. To carry out the attack, the attacker must possess knowledge of the network's Pre-Shared Key (PSK), allowing for potential remote code execution or denial of service against a vulnerable Wi-Fi client.

Affected Version(s)

Realtek RTL8195A Wi-Fi Module Versions before 2020-04-21 (up to and excluding 2.08)

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2020-25854 : Buffer Overflow Vulnerability in Realtek RTL8195A Wi-Fi Module