Vulnerability identifier: #VU25646
Vulnerability risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID:
CWE-ID:
CWE-326
Exploitation vector: Local network
Exploit availability: Yes
Vulnerable software:
Cisco Connected Grid Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco WAP571 Wireless-AC/N Premium Dual Radio Access Point with PoE
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco WAP571E Wireless-AC/N Premium Dual Radio Outdoor Access Point
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Catalyst 9115 Series Wi-Fi 6 Access Points
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Catalyst 9120 Series Access Points
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RV110W Wireless-N VPN Firewall
Hardware solutions /
Routers for home users
RV215W Wireless-N VPN Router
Hardware solutions /
Routers for home users
Cisco Small Business RV130 Series VPN Routers
Hardware solutions /
Routers for home users
Cisco Wireless IP Phone 8821
Hardware solutions /
Office equipment, IP-phones, print servers
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to decrypt Wi-Fi frames.
The vulnerability exists because after an affected device handles a disassociation event it can send a limited number of Wi-Fi frames encrypted with a static, weak Pairwise Temporal Key (PTK). A remote attacker on the local network can acquire these frames and decrypt them with the static PTK without the knowledge of the security session establishment used to secure the Wi-Fi network.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
Cisco Connected Grid Routers: All versions
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router: All versions
RV110W Wireless-N VPN Firewall: All versions
RV215W Wireless-N VPN Router: All versions
Cisco Small Business RV130 Series VPN Routers: All versions
Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE: All versions
Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE: All versions
Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE: All versions
Cisco WAP571 Wireless-AC/N Premium Dual Radio Access Point with PoE: All versions
Cisco WAP571E Wireless-AC/N Premium Dual Radio Outdoor Access Point: All versions
Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point: All versions
Cisco Wireless IP Phone 8821: All versions
Cisco Catalyst 9115 Series Wi-Fi 6 Access Points: All versions
Cisco Catalyst 9120 Series Access Points: All versions
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.