#VU53154 Input validation error in Hardware solutions


Published: 2021-05-12 | Updated: 2021-05-19

Vulnerability identifier: #VU53154

Vulnerability risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-24586

CWE-ID: CWE-20

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Intel Wi-Fi 6E AX210
Hardware solutions / Firmware
Intel Wi-Fi 6 AX201
Hardware solutions / Firmware
Intel Wi-Fi 6 AX200
Hardware solutions / Firmware
Intel Wireless-AC 9560
Hardware solutions / Firmware
Intel Wireless-AC 9462
Hardware solutions / Firmware
Intel Wireless-AC 9461
Hardware solutions / Firmware
Intel Wireless-AC 9260
Hardware solutions / Firmware
Intel Dual Band Wireless-AC 8265
Hardware solutions / Firmware
Intel Dual Band Wireless-AC 8260
Hardware solutions / Firmware
Intel Dual Band Wireless-AC 3168
Hardware solutions / Firmware
Intel Wireless 7265 (Rev D) Family
Hardware solutions / Firmware
Intel Dual Band Wireless-AC 3165
Hardware solutions / Firmware

Vendor:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists in the 802.11 standard due to the affected device does not clear its cache/memory to remove fragments of an incomplete MSDU/MMPDU from previous session after reconnection/reassociation. A remote attacker on the local network can perform a fragment cache attack and perform a denial of service (DoS) attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability