Description
The function DecWPA2KeyData() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an internal function, rt_arc4_crypt_veneer() or _AES_UnWRAP_veneer(), resulting in a stack buffer overflow which can be exploited for remote code execution or denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker needs to know the network's PSK in order to exploit this.
Published: 2021-02-03
Score: 8.1 High
EPSS: 1.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-18487 The function DecWPA2KeyData() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an internal function, rt_arc4_crypt_veneer() or _AES_UnWRAP_veneer(), resulting in a stack buffer overflow which can be exploited for remote code execution or denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker needs to know the network's PSK in order to exploit this.
History

No history.

Subscriptions

Realtek Rtl8195a Rtl8195a Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VDOO

Published:

Updated: 2024-08-04T15:49:05.429Z

Reserved: 2020-09-23T00:00:00.000Z

Link: CVE-2020-25854

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-03T17:15:14.747

Modified: 2024-11-21T05:18:54.527

Link: CVE-2020-25854

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses