CVE编号
CVE-2019-15126利用情况
暂无补丁情况
官方补丁披露时间
2020-02-06漏洞描述
在Broadcom Wi-Fi客户端设备上发现了一个问题。特定的定时和手工流量可能会导致WLAN设备中的内部错误(与状态转换有关),从而导致不正确的第2层Wi-Fi加密,从而有可能通过离散量的流量在空中公开信息,这与漏洞的脆弱性不同。 CVE-2019-9500,CVE-2019-9501,CVE-2019-9502和CVE-2019-9503。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://support.apple.com/en-us/HT210721
参考链接 |
|
---|---|
http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Con... | |
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-wifi-en | |
http://www.huawei.com/en/psirt/security-notices/huawei-sn-20200228-01-kr00k-en | |
https://cert-portal.siemens.com/productcert/pdf/ssa-712518.pdf | |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001 | |
https://support.apple.com/kb/HT210721 | |
https://support.apple.com/kb/HT210722 | |
https://support.apple.com/kb/HT210788 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... | |
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-05 | |
https://www.mist.com/documentation/mist-security-advisory-kr00k-attack-faq/ | |
https://www.synology.com/security/advisory/Synology_SA_20_03 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | apple | ipados | * |
Up to (excluding) 13.2 |
|||||
运行在以下环境 | |||||||||
系统 | apple | iphone_os | * |
Up to (excluding) 13.2 |
|||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x | * |
Up to (excluding) 10.15.1 |
|||||
运行在以下环境 | |||||||||
系统 | broadcom | bcm43012_firmware | - | - | |||||
运行在以下环境 | |||||||||
系统 | broadcom | bcm43013_firmware | - | - | |||||
运行在以下环境 | |||||||||
系统 | broadcom | bcm4356_firmware | - | - | |||||
运行在以下环境 | |||||||||
系统 | broadcom | bcm43752_firmware | - | - | |||||
运行在以下环境 | |||||||||
系统 | broadcom | bcm4375_firmware | - | - | |||||
运行在以下环境 | |||||||||
系统 | broadcom | bcm4389_firmware | - | - | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | linux-firmware | * |
Up to (excluding) 20200107-lp152.2.9.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | linux-firmware | * |
Up to (excluding) 4.12.14-197.105.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | linux-firmware | * |
Up to (excluding) 4.12.14-197.105.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | linux-firmware | * |
Up to (excluding) 20180314-4.6.1 |
|||||
运行在以下环境 | |||||||||
硬件 | broadcom | bcm43012 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | broadcom | bcm43013 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | broadcom | bcm4356 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | broadcom | bcm4375 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | broadcom | bcm43752 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | broadcom | bcm4389 | - | - | |||||
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 传输被破坏
- 服务器危害 DoS
- 全网数量 N/A
还没有评论,来说两句吧...