Vulnerability

CVE-2020-24588

Component: WIFI
Location: OS
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

Impact

Severity (Manufact.)

HIGH

Severity (NIST)

3.5

Severity (Android)

N/A

Chipsets

12

Devices

514

Affected Hardware

NameAlso known asManufacturer
MSM8917
Snapdragon 425
Qualcomm
MSM8953
Snapdragon 625
Qualcomm
SDM636
Snapdragon 636
Qualcomm
SM6150
Snapdragon 675
Qualcomm
SM7325
Snapdragon 778G
Qualcomm
MSM8994
Snapdragon 810
Qualcomm
SM8350
Snapdragon 888
Qualcomm
SC8180
Snapdragon 8c
Qualcomm
SC8180X
Snapdragon 8cx
Qualcomm
MSM8909w
Wear 2100
Wear 2500
Wear 3100
Qualcomm
12 of 12 row(s) shown.

Rows per page

Page 1 of 2

Timeline

Introduced (est):
Jul 1, 2014
Reported:
Dec 13, 2020
Advisory Published:
Aug 2, 2021
CVE Published:
May 11, 2021
Android Patch Level:
Oct 2021
For more information and a detailed analysis of the data presented on this website, please see our paper, to be presented at NDSS'25.
Follow us on Twitter