Information disclosure in Cisco Wi-Fi Protected Network and Wi-Fi Protected Network 2



Published: 2020-02-27
Risk Low
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2019-15126
CWE-ID CWE-326
Exploitation vector Local network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Cisco Connected Grid Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Small Business RV130 Series VPN Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco WAP571 Wireless-AC/N Premium Dual Radio Access Point with PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco WAP571E Wireless-AC/N Premium Dual Radio Outdoor Access Point
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 9115 Series Wi-Fi 6 Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 9120 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

RV110W Wireless-N VPN Firewall
Hardware solutions / Security hardware applicances

RV215W Wireless-N VPN Router
Hardware solutions / Office equipment, IP-phones, print servers

Cisco Wireless IP Phone 8821
Hardware solutions / Office equipment, IP-phones, print servers

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Inadequate Encryption Strength

EUVDB-ID: #VU25646

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C]

CVE-ID: CVE-2019-15126

CWE-ID: CWE-326 - Inadequate Encryption Strength

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to decrypt Wi-Fi frames.

The vulnerability exists because after an affected device handles a disassociation event it can send a limited number of Wi-Fi frames encrypted with a static, weak Pairwise Temporal Key (PTK). A remote attacker on the local network can acquire these frames and decrypt them with the static PTK without the knowledge of the security session establishment used to secure the Wi-Fi network.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Cisco Connected Grid Routers: All versions

Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router: All versions

RV110W Wireless-N VPN Firewall: All versions

RV215W Wireless-N VPN Router: All versions

Cisco Small Business RV130 Series VPN Routers: All versions

Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE: All versions

Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE: All versions

Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE: All versions

Cisco WAP571 Wireless-AC/N Premium Dual Radio Access Point with PoE: All versions

Cisco WAP571E Wireless-AC/N Premium Dual Radio Outdoor Access Point: All versions

Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point: All versions

Cisco Wireless IP Phone 8821: All versions

Cisco Catalyst 9115 Series Wi-Fi 6 Access Points: All versions

Cisco Catalyst 9120 Series Access Points: All versions


CPE2.3 External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###