Vulnerability identifier: #VU53824
Vulnerability risk: Medium
CVSSv3.1: 7.2 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-121
Exploitation vector: Local network
Exploit availability: Yes
Vulnerable software:
RTL8170C
Hardware solutions /
Firmware
RTL8195AM
Hardware solutions /
Firmware
Vendor: Realtek
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when parsing WPA2 key. A remote attacker with knowledge of network PSK can send specially crafted packets to devices connected to the WiFi network, trigger stack-based buffer overflow and execute arbitrary code on WiFi client devices.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
RTL8170C: All versions
RTL8195AM: All versions
External links
http://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.