ID

VAR-202105-0257


CVE

CVE-2020-26145


TITLE

Samsung Galaxy S3 i9305  Vulnerability related to input validation in devices

Trust: 0.8

sources: JVNDB: JVNDB-2021-006941

DESCRIPTION

An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. Bugs fixed (https://bugzilla.redhat.com/): 2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value 5. ========================================================================== Ubuntu Security Notice USN-4997-2 June 25, 2021 linux-kvm vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.04 Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-kvm: Linux kernel for cloud environments Details: USN-4997-1 fixed vulnerabilities in the Linux kernel for Ubuntu 21.04. This update provides the corresponding updates for the Linux KVM kernel for Ubuntu 21.04. Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. (CVE-2021-3609) Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel did not properly enforce limits for pointer operations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33200) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did not properly clear received fragments from memory in some situations. A physically proximate attacker could possibly use this issue to inject packets or expose sensitive information. (CVE-2020-24586) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled encrypted fragments. A physically proximate attacker could possibly use this issue to decrypt fragments. (CVE-2020-24587) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled certain malformed frames. If a user were tricked into connecting to a malicious server, a physically proximate attacker could use this issue to inject packets. (CVE-2020-24588) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled EAPOL frames from unauthenticated senders. A physically proximate attacker could inject malicious packets to cause a denial of service (system crash). (CVE-2020-26139) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did not properly verify certain fragmented frames. (CVE-2020-26141) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation accepted plaintext fragments in certain situations. (CVE-2020-26145) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could reassemble mixed encrypted and plaintext fragments. A physically proximate attacker could possibly use this issue to inject packets or exfiltrate selected fragments. (CVE-2020-26147) Or Cohen discovered that the SCTP implementation in the Linux kernel contained a race condition in some situations, leading to a use-after-free condition. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-23133) Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the nfc implementation in the Linux kernel. A privileged local attacker could use this issue to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-23134) Manfred Paul discovered that the extended Berkeley Packet Filter (eBPF) implementation in the Linux kernel contained an out-of-bounds vulnerability. A local attacker could use this issue to execute arbitrary code. (CVE-2021-31440) Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel did not properly prevent speculative loads in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-31829) It was discovered that a race condition in the kernel Bluetooth subsystem could lead to use-after-free of slab objects. An attacker could use this issue to possibly execute arbitrary code. (CVE-2021-32399) It was discovered that a use-after-free existed in the Bluetooth HCI driver of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33034) It was discovered that an out-of-bounds (OOB) memory access flaw existed in the f2fs module of the Linux kernel. A local attacker could use this issue to cause a denial of service (system crash). (CVE-2021-3506) Mathias Krause discovered that a null pointer dereference existed in the Nitro Enclaves kernel driver of the Linux kernel. A local attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3543) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.04: linux-image-5.11.0-1009-kvm 5.11.0-1009.9 linux-image-kvm 5.11.0.1009.9 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4997-1 CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2020-26139, CVE-2020-26141, CVE-2020-26145, CVE-2020-26147, CVE-2021-23133, CVE-2021-23134, CVE-2021-31440, CVE-2021-31829, CVE-2021-32399, CVE-2021-33034, CVE-2021-33200, CVE-2021-3506, CVE-2021-3543, CVE-2021-3609 Package Information: https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1009.9 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Openshift Logging 5.3.0 bug fix and security update Advisory ID: RHSA-2021:4627-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2021:4627 Issue date: 2021-11-15 CVE Names: CVE-2018-20673 CVE-2018-25009 CVE-2018-25010 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2019-5827 CVE-2019-13750 CVE-2019-13751 CVE-2019-14615 CVE-2019-17594 CVE-2019-17595 CVE-2019-18218 CVE-2019-19603 CVE-2019-20838 CVE-2020-0427 CVE-2020-10001 CVE-2020-12762 CVE-2020-13435 CVE-2020-14145 CVE-2020-14155 CVE-2020-16135 CVE-2020-17541 CVE-2020-24370 CVE-2020-24502 CVE-2020-24503 CVE-2020-24504 CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2020-26139 CVE-2020-26140 CVE-2020-26141 CVE-2020-26143 CVE-2020-26144 CVE-2020-26145 CVE-2020-26146 CVE-2020-26147 CVE-2020-27777 CVE-2020-29368 CVE-2020-29660 CVE-2020-35448 CVE-2020-35521 CVE-2020-35522 CVE-2020-35523 CVE-2020-35524 CVE-2020-36158 CVE-2020-36312 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332 CVE-2020-36386 CVE-2021-0129 CVE-2021-3200 CVE-2021-3348 CVE-2021-3426 CVE-2021-3445 CVE-2021-3481 CVE-2021-3487 CVE-2021-3489 CVE-2021-3564 CVE-2021-3572 CVE-2021-3573 CVE-2021-3580 CVE-2021-3600 CVE-2021-3635 CVE-2021-3659 CVE-2021-3679 CVE-2021-3732 CVE-2021-3778 CVE-2021-3796 CVE-2021-3800 CVE-2021-20194 CVE-2021-20197 CVE-2021-20231 CVE-2021-20232 CVE-2021-20239 CVE-2021-20266 CVE-2021-20284 CVE-2021-22876 CVE-2021-22898 CVE-2021-22925 CVE-2021-23133 CVE-2021-23840 CVE-2021-23841 CVE-2021-27645 CVE-2021-28153 CVE-2021-28950 CVE-2021-28971 CVE-2021-29155 CVE-2021-29646 CVE-2021-29650 CVE-2021-31440 CVE-2021-31535 CVE-2021-31829 CVE-2021-31916 CVE-2021-33033 CVE-2021-33194 CVE-2021-33200 CVE-2021-33560 CVE-2021-33574 CVE-2021-35942 CVE-2021-36084 CVE-2021-36085 CVE-2021-36086 CVE-2021-36087 CVE-2021-42574 ===================================================================== 1. Summary: An update is now available for OpenShift Logging 5.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Openshift Logging Bug Fix Release (5.3.0) Security Fix(es): * golang: x/net/html: infinite loop in ParseFragment (CVE-2021-33194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update: https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html For Red Hat OpenShift Logging 5.3, see the following instructions to apply this update: https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment 5. JIRA issues fixed (https://issues.jboss.org/): LOG-1168 - Disable hostname verification in syslog TLS settings LOG-1235 - Using HTTPS without a secret does not translate into the correct 'scheme' value in Fluentd LOG-1375 - ssl_ca_cert should be optional LOG-1378 - CLO should support sasl_plaintext(Password over http) LOG-1392 - In fluentd config, flush_interval can't be set with flush_mode=immediate LOG-1494 - Syslog output is serializing json incorrectly LOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server LOG-1575 - Rejected by Elasticsearch and unexpected json-parsing LOG-1735 - Regression introducing flush_at_shutdown LOG-1774 - The collector logs should be excluded in fluent.conf LOG-1776 - fluentd total_limit_size sets value beyond available space LOG-1822 - OpenShift Alerting Rules Style-Guide Compliance LOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled LOG-1862 - Unsupported kafka parameters when enabled Kafka SASL LOG-1903 - Fix the Display of ClusterLogging type in OLM LOG-1911 - CLF API changes to Opt-in to multiline error detection LOG-1918 - Alert `FluentdNodeDown` always firing LOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYZJxoNzjgjWX9erEAQji2Q//bv8hVZq0D8Dz0Do5vdoPzpjDhM6wJr7U 3CqAqcxniXvHVbBiPHPsY3p3M62FSO5lg4oZnVfokEtrZmLe9ULZWLlNxVilAUCT 0urKKWCAIXF+QJcW9/KCuIfaMh8Mmvh2baq52azauCHCJ3UK9ontiGWqyUz/aq9F TM4P/eehnUU1WXAz9x4ycHP7fHZBuADkI8WOUZ5M/QpcoEvo7rLFdyat5MpMkeJx j7gGieb2ITvblxEML3LRdPljQxe56w7p2jC/EoXJnssjABozlWB936Ub/QSulGuz +HQS+RnAGxRRpNcs1wNQzpIkCFJN2S0jlEj5VLB8xLbZTYtILWhIx4rlwaFy6NJn /z7hpEfSAgmhPTejshI/2Gfu/sc+KStEJk2IasWO1wqQWRqYGVeLwgHxBt2wpX+I XJUjhkAdhAWyDfEhPXzpbN4dhmDk0QiGfL3KWZ8nO54IFQgZHT1P1YArnI1hMWC7 JhTyj1DtFOKJl8X28wf6RNui+ifD12hmIAuQRuJTPjZbTnywwpMy+Sq9mrfeHztb gPt2AqOPF5ksNB6OsjVKlMScLlLJzzlkBVgmurXaly0z2qLjy0Rl70oWeMOW4xUD 4Ravk3PLEMqSIHv0ECr4ku5ejMV1Rd46USrgVX2R0CALXIxPkk1IEN8hHmzIGz2D HHJuAvrlroc= =di1X -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.88

sources: NVD: CVE-2020-26145 // JVNDB: JVNDB-2021-006941 // CNVD: CNVD-2021-34681 // VULMON: CVE-2020-26145 // PACKETSTORM: 165296 // PACKETSTORM: 166568 // PACKETSTORM: 163249 // PACKETSTORM: 163251 // PACKETSTORM: 163255 // PACKETSTORM: 163301 // PACKETSTORM: 164967

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-34681

AFFECTED PRODUCTS

vendor:siemensmodel:6gk5766-1ge00-3db0scope:ltversion:1.2

Trust: 1.0

vendor:siemensmodel:6gk5766-1je00-7da0scope:ltversion:1.2

Trust: 1.0

vendor:siemensmodel:6gk5766-1ge00-7ta0scope:ltversion:1.2

Trust: 1.0

vendor:siemensmodel:6gk5766-1je00-3da0scope:ltversion:1.2

Trust: 1.0

vendor:siemensmodel:6gk5766-1ge00-7da0scope:ltversion:1.2

Trust: 1.0

vendor:siemensmodel:6gk5763-1al00-7da0scope:ltversion:1.2

Trust: 1.0

vendor:siemensmodel:6gk5763-1al00-3aa0scope:ltversion:1.2

Trust: 1.0

vendor:samsungmodel:galaxy i9305scope:eqversion:4.4.4

Trust: 1.0

vendor:siemensmodel:6gk5766-1ge00-7db0scope:ltversion:1.2

Trust: 1.0

vendor:siemensmodel:6gk5763-1al00-3da0scope:ltversion:1.2

Trust: 1.0

vendor:siemensmodel:6gk5766-1je00-7ta0scope:ltversion:1.2

Trust: 1.0

vendor:siemensmodel:6gk5766-1ge00-3da0scope:ltversion:1.2

Trust: 1.0

vendor:siemensmodel:6gk5766-1ge00-7tb0scope:ltversion:1.2

Trust: 1.0

vendor:日本電気model:nec ai acceleratorscope: - version: -

Trust: 0.8

vendor:サムスンmodel:galaxy s3 i9305scope: - version: -

Trust: 0.8

vendor:日本電気model:atermscope:eqversion: -

Trust: 0.8

vendor:samsungmodel:galaxy s3 i9305scope:eqversion:4.4.4

Trust: 0.6

sources: CNVD: CNVD-2021-34681 // JVNDB: JVNDB-2021-006941 // NVD: CVE-2020-26145

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-26145
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-26145
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2021-34681
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202105-631
value: MEDIUM

Trust: 0.6

VULMON: CVE-2020-26145
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-26145
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-34681
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:C/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-26145
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2020-26145
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-34681 // VULMON: CVE-2020-26145 // JVNDB: JVNDB-2021-006941 // CNNVD: CNNVD-202105-631 // NVD: CVE-2020-26145

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-006941 // NVD: CVE-2020-26145

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202105-631

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202105-631

PATCH

title:Welcome to Samsung Mobile Security NEC NEC Product security informationurl:https://security.samsungmobile.com/main.smsb

Trust: 0.8

title:Patch for Samsung Galaxy S3 input validation error vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/264941

Trust: 0.6

title:Samsung Galaxy S3 Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=150564

Trust: 0.6

title:Red Hat: CVE-2020-26145url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2020-26145

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-26145 log

Trust: 0.1

title:Ubuntu Security Notice: USN-5361-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5361-1

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.4-2022-004url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-004

Trust: 0.1

title:Cisco: Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-wifi-faf-22epcEWu

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.10-2022-002url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.10-2022-002

Trust: 0.1

title: - url:https://github.com/kali973/fragAttacks

Trust: 0.1

title:fragattacksurl:https://github.com/vanhoefm/fragattacks

Trust: 0.1

sources: CNVD: CNVD-2021-34681 // VULMON: CVE-2020-26145 // JVNDB: JVNDB-2021-006941 // CNNVD: CNNVD-202105-631

EXTERNAL IDS

db:NVDid:CVE-2020-26145

Trust: 4.6

db:OPENWALLid:OSS-SECURITY/2021/05/11/12

Trust: 2.5

db:SIEMENSid:SSA-913875

Trust: 1.7

db:JVNid:JVNVU93485736

Trust: 0.8

db:JVNDBid:JVNDB-2021-006941

Trust: 0.8

db:ICS CERTid:ICSA-22-104-04

Trust: 0.7

db:PACKETSTORMid:166568

Trust: 0.7

db:PACKETSTORMid:163249

Trust: 0.7

db:CNVDid:CNVD-2021-34681

Trust: 0.6

db:CS-HELPid:SB2021100407

Trust: 0.6

db:CS-HELPid:SB2021051814

Trust: 0.6

db:CS-HELPid:SB2021051212

Trust: 0.6

db:CS-HELPid:SB2021051915

Trust: 0.6

db:AUSCERTid:ESB-2021.2216

Trust: 0.6

db:AUSCERTid:ESB-2021.3905

Trust: 0.6

db:AUSCERTid:ESB-2021.2079

Trust: 0.6

db:AUSCERTid:ESB-2021.2136

Trust: 0.6

db:AUSCERTid:ESB-2021.1628

Trust: 0.6

db:AUSCERTid:ESB-2022.1408

Trust: 0.6

db:AUSCERTid:ESB-2021.4254

Trust: 0.6

db:AUSCERTid:ESB-2021.2249

Trust: 0.6

db:AUSCERTid:ESB-2021.2290

Trust: 0.6

db:AUSCERTid:ESB-2022.1715

Trust: 0.6

db:AUSCERTid:ESB-2021.2511

Trust: 0.6

db:AUSCERTid:ESB-2021.2876

Trust: 0.6

db:AUSCERTid:ESB-2021.3825

Trust: 0.6

db:ICS CERTid:ICSA-21-236-01

Trust: 0.6

db:PACKETSTORMid:164875

Trust: 0.6

db:PACKETSTORMid:163291

Trust: 0.6

db:LENOVOid:LEN-61212

Trust: 0.6

db:CNNVDid:CNNVD-202105-631

Trust: 0.6

db:VULMONid:CVE-2020-26145

Trust: 0.1

db:PACKETSTORMid:165296

Trust: 0.1

db:PACKETSTORMid:163251

Trust: 0.1

db:PACKETSTORMid:163255

Trust: 0.1

db:PACKETSTORMid:163301

Trust: 0.1

db:PACKETSTORMid:164967

Trust: 0.1

sources: CNVD: CNVD-2021-34681 // VULMON: CVE-2020-26145 // PACKETSTORM: 165296 // PACKETSTORM: 166568 // PACKETSTORM: 163249 // PACKETSTORM: 163251 // PACKETSTORM: 163255 // PACKETSTORM: 163301 // PACKETSTORM: 164967 // JVNDB: JVNDB-2021-006941 // CNNVD: CNNVD-202105-631 // NVD: CVE-2020-26145

REFERENCES

url:http://www.openwall.com/lists/oss-security/2021/05/11/12

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-26145

Trust: 1.9

url:https://www.fragattacks.com

Trust: 1.7

url:https://github.com/vanhoefm/fragattacks/blob/master/summary.md

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf

Trust: 1.7

url:https://jvn.jp/vu/jvnvu93485736/

Trust: 0.8

url:https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-61212

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2216

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2876

Trust: 0.6

url:https://source.android.com/security/bulletin/2021-10-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3905

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1628

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3825

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-104-04

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-wifi-faf-22epcewu

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021100407

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-236-01

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051814

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1408

Trust: 0.6

url:https://vigilance.fr/vulnerability/wi-fi-devices-multiple-vulnerabilities-via-fragattacks-35386

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051915

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051212

Trust: 0.6

url:https://packetstormsecurity.com/files/163291/ubuntu-security-notice-usn-5000-2.html

Trust: 0.6

url:https://packetstormsecurity.com/files/164875/red-hat-security-advisory-2021-4140-02.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2249

Trust: 0.6

url:https://packetstormsecurity.com/files/163249/ubuntu-security-notice-usn-4997-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2511

Trust: 0.6

url:https://packetstormsecurity.com/files/166568/ubuntu-security-notice-usn-5361-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2136

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4254

Trust: 0.6

url:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202111-0000001218088197

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2079

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2290

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20210513-01-fragattacks-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1715

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-26141

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-26147

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-24588

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-24586

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-23133

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-24587

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-3609

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-31440

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-26139

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-26145

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-3543

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-33200

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-32399

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-3506

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-23134

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-33034

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-31829

Trust: 0.3

url:https://ubuntu.com/security/notices/usn-5361-1

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24504

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-27777

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20239

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36158

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-16135

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3200

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35448

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3635

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25013

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20284

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25012

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35522

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-5827

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36386

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35524

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20673

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-0427

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25013

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24586

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3348

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25009

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-27645

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33574

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26140

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3487

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-13435

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26146

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-31440

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5827

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3732

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24370

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-0129

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14145

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13751

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-10001

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24502

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25014

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3564

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-0427

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-23133

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19603

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-14145

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25012

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26144

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35521

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3679

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-35942

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17594

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36312

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24370

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3572

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-12762

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36086

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-29368

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3778

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-13750

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-13751

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-22898

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24588

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-29646

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-29155

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12762

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-16135

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36084

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-17541

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3489

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3800

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17594

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36087

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36331

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-29660

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-31535

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26139

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-28971

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-23841

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14615

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26143

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3445

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3600

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-13435

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-19603

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-22925

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-20673

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-23840

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33200

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36330

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-29650

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33033

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-18218

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20194

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26147

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20232

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-31916

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20266

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20838

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-22876

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20231

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36332

Trust: 0.2

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14155

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25010

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-20838

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-17541

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-10001

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24503

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25014

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36085

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14615

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33560

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24502

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17595

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3481

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-42574

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-14155

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25009

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25010

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35523

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-31829

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-28153

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3573

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13750

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20197

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26141

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3426

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-28950

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-18218

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3580

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3796

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17595

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24587

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24503

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3659

Trust: 0.2

url:https://ubuntu.com/security/notices/usn-4997-1

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-04

Trust: 0.1

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-009

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43527

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44228

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3712

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5137

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-42739

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-0920

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28964

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37159

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4083

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-0935

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-45486

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3702

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12888

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-31916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39636

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43976

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.11.0-1010.10

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.11.0-1011.11

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.11.0-1012.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.11.0-1011.12

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.11.0-1009.9

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.11.0-22.23

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.8/5.8.0-1033.34~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.8/5.8.0-1036.38~20.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25670

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.8.0-1029.32

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.8.0-1035.37

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.8.0-59.66

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25671

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29155

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.8.0-1038.40

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.8.0-1036.38

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25673

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.8/5.8.0-59.66~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.8.0-1030.32

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.8/5.8.0-1035.37~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.8/5.8.0-1038.40~20.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4999-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.8.0-1033.34

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5001-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem-5.10/5.10.0-1033.34

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1009.9

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4997-2

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33194

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:4627

Trust: 0.1

sources: CNVD: CNVD-2021-34681 // VULMON: CVE-2020-26145 // PACKETSTORM: 165296 // PACKETSTORM: 166568 // PACKETSTORM: 163249 // PACKETSTORM: 163251 // PACKETSTORM: 163255 // PACKETSTORM: 163301 // PACKETSTORM: 164967 // JVNDB: JVNDB-2021-006941 // CNNVD: CNNVD-202105-631 // NVD: CVE-2020-26145

CREDITS

Siemens reported these vulnerabilities to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202105-631

SOURCES

db:CNVDid:CNVD-2021-34681
db:VULMONid:CVE-2020-26145
db:PACKETSTORMid:165296
db:PACKETSTORMid:166568
db:PACKETSTORMid:163249
db:PACKETSTORMid:163251
db:PACKETSTORMid:163255
db:PACKETSTORMid:163301
db:PACKETSTORMid:164967
db:JVNDBid:JVNDB-2021-006941
db:CNNVDid:CNNVD-202105-631
db:NVDid:CVE-2020-26145

LAST UPDATE DATE

2025-06-15T20:11:57.718000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-34681date:2021-05-14T00:00:00
db:VULMONid:CVE-2020-26145date:2022-05-13T00:00:00
db:JVNDBid:JVNDB-2021-006941date:2024-02-27T02:28:00
db:CNNVDid:CNNVD-202105-631date:2022-05-16T00:00:00
db:NVDid:CVE-2020-26145date:2022-05-13T20:53:57.840

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-34681date:2021-05-14T00:00:00
db:VULMONid:CVE-2020-26145date:2021-05-11T00:00:00
db:PACKETSTORMid:165296date:2021-12-15T15:27:05
db:PACKETSTORMid:166568date:2022-04-01T15:43:33
db:PACKETSTORMid:163249date:2021-06-23T15:33:13
db:PACKETSTORMid:163251date:2021-06-23T15:35:21
db:PACKETSTORMid:163255date:2021-06-23T15:41:26
db:PACKETSTORMid:163301date:2021-06-28T16:22:26
db:PACKETSTORMid:164967date:2021-11-15T17:25:56
db:JVNDBid:JVNDB-2021-006941date:2022-01-26T00:00:00
db:CNNVDid:CNNVD-202105-631date:2021-05-11T00:00:00
db:NVDid:CVE-2020-26145date:2021-05-11T20:15:08.873