{"api_version":"1","generated_at":"2026-04-22T21:37:49+00:00","cve":"CVE-2020-26145","urls":{"html":"https://cve.report/CVE-2020-26145","api":"https://cve.report/api/cve/CVE-2020-26145.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-26145","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-26145"},"summary":{"title":"CVE-2020-26145","description":"An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.","state":"PUBLISHED","assigner":"mitre","published_at":"2021-05-11 20:15:08","updated_at":"2026-04-14 09:16:25"},"problem_types":["CWE-20","n/a"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"3.3","severity":"","vector":"AV:A/AC:L/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:N/I:P/A:N","baseScore":3.3,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md","name":"https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"fragattacks/SUMMARY.md at master · vanhoefm/fragattacks · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.fragattacks.com","name":"https://www.fragattacks.com","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"FragAttacks: Security flaws in all Wi-Fi devices","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-913875.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-913875.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2021/05/11/12","name":"http://www.openwall.com/lists/oss-security/2021/05/11/12","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"oss-security - various 802.11 security issues - fragattacks.com","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-26145","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26145","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE WAM763-1","version":"affected V1.2.0 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE WAM766-1","version":"affected V1.2.0 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE WAM766-1 (US)","version":"affected V1.2.0 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE WAM766-1 EEC","version":"affected V1.2.0 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE WAM766-1 EEC (US)","version":"affected V1.2.0 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE WUM763-1","version":"affected V1.2.0 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE WUM763-1","version":"affected V1.2.0 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE WUM766-1","version":"affected V1.2.0 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE WUM766-1 (USA)","version":"affected V1.2.0 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"samsung","cpe5":"galaxy_i9305","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"samsung","cpe5":"galaxy_i9305_firmware","cpe6":"4.4.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5763-1al00-3aa0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5763-1al00-3aa0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5763-1al00-3da0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5763-1al00-3da0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5763-1al00-7da0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5763-1al00-7da0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5766-1ge00-3da0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5766-1ge00-3da0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5766-1ge00-3db0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5766-1ge00-3db0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5766-1ge00-7da0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5766-1ge00-7da0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5766-1ge00-7db0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5766-1ge00-7db0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5766-1ge00-7ta0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5766-1ge00-7ta0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5766-1ge00-7tb0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5766-1ge00-7tb0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5766-1je00-3da0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5766-1je00-3da0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5766-1je00-7da0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5766-1je00-7da0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"6gk5766-1je00-7ta0","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"6gk5766-1je00-7ta0_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2020","cve_id":"26145","cve":"CVE-2020-26145","epss":"0.027270000","percentile":"0.859610000","score_date":"2026-04-15","updated_at":"2026-04-16 00:13:56"},"legacy_qids":[{"cve":"CVE-2020-26145","qid":"159338","title":"Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel (ELSA-2021-9404)"},{"cve":"CVE-2020-26145","qid":"159339","title":"Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel-container (ELSA-2021-9406)"},{"cve":"CVE-2020-26145","qid":"159403","title":"Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel (ELSA-2021-9459)"},{"cve":"CVE-2020-26145","qid":"159492","title":"Oracle Enterprise Linux Security Update for kernel (ELSA-2021-4356)"},{"cve":"CVE-2020-26145","qid":"198416","title":"Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4997-1)"},{"cve":"CVE-2020-26145","qid":"198417","title":"Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4999-1)"},{"cve":"CVE-2020-26145","qid":"198418","title":"Ubuntu Security Notification for Linux kernel vulnerabilities (USN-5000-1)"},{"cve":"CVE-2020-26145","qid":"198419","title":"Ubuntu Security Notification for Linux kernel (OEM) vulnerabilities (USN-5001-1)"},{"cve":"CVE-2020-26145","qid":"198425","title":"Ubuntu Security Notification for Linux kernel (KVM) vulnerabilities (USN-5000-2)"},{"cve":"CVE-2020-26145","qid":"198426","title":"Ubuntu Security Notification for Linux kernel (KVM) vulnerabilities (USN-4997-2)"},{"cve":"CVE-2020-26145","qid":"239816","title":"Red Hat Update for kernel security (RHSA-2021:4356)"},{"cve":"CVE-2020-26145","qid":"239879","title":"Red Hat Update for kernel-rt (RHSA-2021:4140)"},{"cve":"CVE-2020-26145","qid":"353147","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-004"},{"cve":"CVE-2020-26145","qid":"353158","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-002"},{"cve":"CVE-2020-26145","qid":"390248","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for kernel (OVMSA-2021-0035)"},{"cve":"CVE-2020-26145","qid":"591035","title":"Siemens SCALANCE FragAttacks Multiple Vulnerabilities (ICSA-22-104-04) (SSA-913875)"},{"cve":"CVE-2020-26145","qid":"591150","title":"Hitachi ABB Power Grids TropOS Multiple Vulnerabilities (ICSA-21-236-01,9AKK107992A4463)"},{"cve":"CVE-2020-26145","qid":"610373","title":"Google Android Devices October 2021 Security Patch Missing"},{"cve":"CVE-2020-26145","qid":"610381","title":"Google Android November 2021 Security Patch Missing for Huawei EMUI"},{"cve":"CVE-2020-26145","qid":"610383","title":"Google Android November 2021 Security Patch Missing for LGE"},{"cve":"CVE-2020-26145","qid":"671051","title":"EulerOS Security Update for kernel (EulerOS-SA-2021-2663)"},{"cve":"CVE-2020-26145","qid":"671441","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1366)"},{"cve":"CVE-2020-26145","qid":"671703","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1735)"},{"cve":"CVE-2020-26145","qid":"750117","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1891-1)"},{"cve":"CVE-2020-26145","qid":"750118","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1890-1)"},{"cve":"CVE-2020-26145","qid":"750121","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1888-1)"},{"cve":"CVE-2020-26145","qid":"750125","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1887-1)"},{"cve":"CVE-2020-26145","qid":"750126","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1889-1)"},{"cve":"CVE-2020-26145","qid":"750139","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1913-1)"},{"cve":"CVE-2020-26145","qid":"750140","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1912-1)"},{"cve":"CVE-2020-26145","qid":"750171","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:0843-1)"},{"cve":"CVE-2020-26145","qid":"750650","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1975-1)"},{"cve":"CVE-2020-26145","qid":"750652","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1977-1)"},{"cve":"CVE-2020-26145","qid":"750741","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:0947-1)"},{"cve":"CVE-2020-26145","qid":"750762","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1977-1)"},{"cve":"CVE-2020-26145","qid":"750766","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1975-1)"},{"cve":"CVE-2020-26145","qid":"750864","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2421-1)"},{"cve":"CVE-2020-26145","qid":"750880","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2451-1)"},{"cve":"CVE-2020-26145","qid":"940265","title":"AlmaLinux Security Update for kernel (ALSA-2021:4356)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-04T15:49:07.134Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.fragattacks.com"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"},{"name":"[oss-security] 20210511 various 802.11 security issues - fragattacks.com","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2021/05/11/12"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"}],"title":"CVE Program Container"},{"affected":[{"defaultStatus":"unknown","product":"SCALANCE WAM763-1","vendor":"Siemens","versions":[{"lessThan":"V1.2.0","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE WAM766-1","vendor":"Siemens","versions":[{"lessThan":"V1.2.0","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE WAM766-1 (US)","vendor":"Siemens","versions":[{"lessThan":"V1.2.0","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE WAM766-1 EEC","vendor":"Siemens","versions":[{"lessThan":"V1.2.0","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE WAM766-1 EEC (US)","vendor":"Siemens","versions":[{"lessThan":"V1.2.0","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE WUM763-1","vendor":"Siemens","versions":[{"lessThan":"V1.2.0","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE WUM763-1","vendor":"Siemens","versions":[{"lessThan":"V1.2.0","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE WUM766-1","vendor":"Siemens","versions":[{"lessThan":"V1.2.0","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE WUM766-1 (USA)","vendor":"Siemens","versions":[{"lessThan":"V1.2.0","status":"affected","version":"0","versionType":"custom"}]}],"providerMetadata":{"dateUpdated":"2026-04-14T08:49:09.886Z","orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP"},"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-913875.html"}],"x_adpType":"supplier"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-07-13T12:06:43.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.fragattacks.com"},{"tags":["x_refsource_MISC"],"url":"https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"},{"name":"[oss-security] 20210511 various 802.11 security issues - fragattacks.com","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2021/05/11/12"},{"tags":["x_refsource_CONFIRM"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-26145","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://www.fragattacks.com","refsource":"MISC","url":"https://www.fragattacks.com"},{"name":"https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md","refsource":"MISC","url":"https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"},{"name":"[oss-security] 20210511 various 802.11 security issues - fragattacks.com","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2021/05/11/12"},{"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf","refsource":"CONFIRM","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2020-26145","datePublished":"2021-05-11T19:35:10.000Z","dateReserved":"2020-09-29T00:00:00.000Z","dateUpdated":"2026-04-14T08:49:09.886Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2021-05-11 20:15:08","lastModifiedDate":"2026-04-14 09:16:25","problem_types":["CWE-20","n/a"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:N/I:P/A:N","baseScore":3.3,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.5,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:samsung:galaxy_i9305_firmware:4.4.4:*:*:*:*:*:*:*","matchCriteriaId":"B5CFC281-DDBA-4511-A271-FCFFA337E2B9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:samsung:galaxy_i9305:-:*:*:*:*:*:*:*","matchCriteriaId":"79194A52-BFFC-448B-9032-F29D2A5971BE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5763-1al00-7da0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"9C148549-31FC-48E5-860B-56364F15A9A4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5763-1al00-7da0:-:*:*:*:*:*:*:*","matchCriteriaId":"72E99748-08CA-4515-B64B-A7696E7C9824"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5766-1ge00-7da0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"B6E3450B-8B5F-4510-8D07-1D5A1BA214E1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5766-1ge00-7da0:-:*:*:*:*:*:*:*","matchCriteriaId":"A9A76803-CFF6-4A82-A5EC-10A3946A91D3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5766-1ge00-7db0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"7A9D34A4-CBF4-4B78-A20D-33DB7DD3609E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5766-1ge00-7db0:-:*:*:*:*:*:*:*","matchCriteriaId":"9AAE92C7-5197-48AA-9334-62D3E313F8AE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5766-1je00-7da0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"74D91A1E-53EE-482B-A3D1-53E955DCDE2E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5766-1je00-7da0:-:*:*:*:*:*:*:*","matchCriteriaId":"6D4F2AD0-57B4-4947-8887-9F26C47909CB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5766-1ge00-7ta0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"DBD0BD5B-54E2-4A29-8AFE-D4796B65FA2B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5766-1ge00-7ta0:-:*:*:*:*:*:*:*","matchCriteriaId":"4450B377-C7C1-4225-9304-C4AC79AB7E71"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5766-1ge00-7tb0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"C8852F24-7613-43AA-A91C-4665721C75DA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5766-1ge00-7tb0:-:*:*:*:*:*:*:*","matchCriteriaId":"802CE18D-AF89-46F3-82EF-83F9590A49DA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5766-1je00-7ta0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"B8040707-3EE4-48CD-BEB0-B11136EC1841"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5766-1je00-7ta0:-:*:*:*:*:*:*:*","matchCriteriaId":"BFC81171-3522-4982-BFA8-940E161AF217"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5763-1al00-3aa0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"749D2AF5-A5A4-4CBF-98C9-A3AC9C55494E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5763-1al00-3aa0:-:*:*:*:*:*:*:*","matchCriteriaId":"E50D46EE-B0D0-4385-BF21-804CB1B9556C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5763-1al00-3da0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"05C27085-76D9-4185-A578-82B71A360731"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5763-1al00-3da0:-:*:*:*:*:*:*:*","matchCriteriaId":"781FDDBB-8DCA-4B65-8906-E78FBE3CFDA1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5766-1ge00-3da0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"7A705BE0-37DB-4D49-AD50-B68CFE273C0D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5766-1ge00-3da0:-:*:*:*:*:*:*:*","matchCriteriaId":"2C591807-63DE-40DC-8E0A-083080FDC6FC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5766-1ge00-3db0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"D66877F3-BA23-4FAE-8FFD-7E81332F58B6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5766-1ge00-3db0:-:*:*:*:*:*:*:*","matchCriteriaId":"142E900D-63F3-4CC7-9E27-026B4C38A803"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:6gk5766-1je00-3da0_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2","matchCriteriaId":"800E0542-02E5-4390-9AF0-82F3DD0B2523"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:6gk5766-1je00-3da0:-:*:*:*:*:*:*:*","matchCriteriaId":"420D0BD5-A206-4A3F-8978-6D0959CE4F14"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"26145","Ordinal":"1","Title":"CVE-2020-26145","CVE":"CVE-2020-26145","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"26145","Ordinal":"1","NoteData":"An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.","Type":"Description","Title":"CVE-2020-26145"},{"CveYear":"2020","CveId":"26145","Ordinal":"2","NoteData":"2021-05-11","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"26145","Ordinal":"3","NoteData":"2021-07-13","Type":"Other","Title":"Modified"}]}}}