Vulnerability Details : CVE-2020-9395
An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2020-9395
- cpe:2.3:o:realtek:rtl8711af_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:realtek:rtl8711am_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:realtek:rtl8195am_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:realtek:rtl8710af_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-9395
0.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-9395
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:A/AC:M/Au:S/C:P/I:P/A:P |
4.4
|
6.4
|
NIST | |
8.0
|
HIGH | CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
1.3
|
6.0
|
NIST |
CWE ids for CVE-2020-9395
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-9395
-
https://www.amebaiot.com/en/security_bulletin/
Realtek IoT/Wi-Fi MCU SolutionsThird Party Advisory
-
https://github.com/ambiot/amb1_arduino/commit/dcea55cf9775a0166805b3db845b237ecd5e74ea#diff-d06e7a87f34cc464a56799a419033014
Title: Update wlan library · ambiot/amb1_arduino@dcea55c · GitHubPatch;Third Party Advisory
-
https://github.com/ambiot/amb1_sdk/commit/bc5173d5d4faf6829074b0f1e1b242c12b7777a3#diff-700c216fb376666eaeda0c892e8bdc09
[WLAN] Update wlan library · ambiot/amb1_sdk@bc5173d · GitHubPatch;Third Party Advisory
Jump to