← Retour aux CVEs
CVE-2019-15126
LOW3.1
Description
An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.
Details CVE
Score CVSS v3.13.1
SeveriteLOW
Vecteur CVSSCVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Vecteur d'attaqueADJACENT_NETWORK
ComplexiteHIGH
Privileges requisNONE
Interaction utilisateurNONE
Publie2/5/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
apple:ipadosapple:iphone_osapple:mac_os_xbroadcom:bcm43012broadcom:bcm43012_firmwarebroadcom:bcm43013broadcom:bcm43013_firmwarebroadcom:bcm4356broadcom:bcm4356_firmwarebroadcom:bcm4375broadcom:bcm43752broadcom:bcm43752_firmwarebroadcom:bcm4375_firmwarebroadcom:bcm4389broadcom:bcm4389_firmware
Faiblesses (CWE)
CWE-367
References
http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html(cve@mitre.org)
https://support.apple.com/kb/HT210721(cve@mitre.org)
https://support.apple.com/kb/HT210722(cve@mitre.org)
https://support.apple.com/kb/HT210788(cve@mitre.org)
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure(cve@mitre.org)
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-05(cve@mitre.org)
https://www.synology.com/security/advisory/Synology_SA_20_03(cve@mitre.org)
http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-wifi-en(af854a3a-2127-422b-91ae-364da2661108)
http://www.huawei.com/en/psirt/security-notices/huawei-sn-20200228-01-kr00k-en(af854a3a-2127-422b-91ae-364da2661108)
https://cert-portal.siemens.com/productcert/pdf/ssa-712518.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT210721(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT210722(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT210788(af854a3a-2127-422b-91ae-364da2661108)
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure(af854a3a-2127-422b-91ae-364da2661108)
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-05(af854a3a-2127-422b-91ae-364da2661108)
https://www.mist.com/documentation/mist-security-advisory-kr00k-attack-faq/(af854a3a-2127-422b-91ae-364da2661108)
https://www.synology.com/security/advisory/Synology_SA_20_03(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.