cve/2019/CVE-2019-18991.md

18 lines
904 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-18991](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18991)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A partial authentication bypass vulnerability exists on Atheros AR9132 3.60(AMX.8), AR9283 1.85, and AR9285 1.0.0.12NA devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.
### POC
#### Reference
- https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/
#### Github
No PoCs found on GitHub currently.