6.5
MEDIUM
CVE-2020-26141
ALFA AWUS036H Wi-Fi TKIP Frame Authentication Bypass Vulnerability
Description

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.

INFO

Published Date :

May 11, 2021, 8:15 p.m.

Last Modified :

April 22, 2022, 7:33 p.m.

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

2.8
Public PoC/Exploit Available at Github

CVE-2020-26141 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2020-26141 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Cisco ip_conference_phone_8832_firmware
2 Cisco ip_phone_8861_firmware
3 Cisco ip_phone_8865_firmware
4 Cisco wireless_ip_phone_8821_firmware
5 Cisco ip_phone_6861_firmware
6 Cisco meraki_mx64w_firmware
7 Cisco meraki_mx67w_firmware
8 Cisco meraki_mx68cw_firmware
9 Cisco meraki_mx68w_firmware
10 Cisco meraki_gr10_firmware
11 Cisco meraki_gr60_firmware
12 Cisco meraki_mr12_firmware
13 Cisco meraki_mr20_firmware
14 Cisco meraki_mr26_firmware
15 Cisco meraki_mr30h_firmware
16 Cisco meraki_mr32_firmware
17 Cisco meraki_mr33_firmware
18 Cisco meraki_mr34_firmware
19 Cisco meraki_mr36_firmware
20 Cisco meraki_mr42_firmware
21 Cisco meraki_mr42e_firmware
22 Cisco meraki_mr44_firmware
23 Cisco meraki_mr45_firmware
24 Cisco meraki_mr46_firmware
25 Cisco meraki_mr46e_firmware
26 Cisco meraki_mr52_firmware
27 Cisco meraki_mr53_firmware
28 Cisco meraki_mr53e_firmware
29 Cisco meraki_mr55_firmware
30 Cisco meraki_mr56_firmware
31 Cisco meraki_mr62_firmware
32 Cisco meraki_mr66_firmware
33 Cisco meraki_mr70_firmware
34 Cisco meraki_mr72_firmware
35 Cisco meraki_mr74_firmware
36 Cisco meraki_mr76_firmware
37 Cisco meraki_mr84_firmware
38 Cisco meraki_mr86_firmware
39 Cisco meraki_mx65w_firmware
40 Cisco meraki_mx67cw_firmware
41 Cisco meraki_z3_firmware
42 Cisco meraki_z3c_firmware
43 Cisco meraki_mr18_firmware
44 Cisco webex_room_series_firmware
45 Cisco webex_desk_series_firmware
46 Cisco webex_board_series_firmware
47 Cisco webex_wireless_phone_860_firmware
48 Cisco webex_wireless_phone_840_firmware
1 Siemens 6gk5778-1gy00-0ab0_firmware
2 Siemens 6gk5778-1gy00-0aa0_firmware
3 Siemens 6gk5721-1fc00-0aa0_firmware
4 Siemens 6gk5721-1fc00-0ab0_firmware
5 Siemens 6gk5722-1fc00-0aa0_firmware
6 Siemens 6gk5722-1fc00-0ab0_firmware
7 Siemens 6gk5722-1fc00-0ac0_firmware
8 Siemens 6gk5734-1fx00-0aa0_firmware
9 Siemens 6gk5734-1fx00-0aa6_firmware
10 Siemens 6gk5734-1fx00-0ab0_firmware
11 Siemens 6gk5734-1fx00-0ab6_firmware
12 Siemens 6gk5738-1gy00-0aa0_firmware
13 Siemens 6gk5738-1gy00-0ab0_firmware
14 Siemens 6gk5748-1fc00-0aa0_firmware
15 Siemens 6gk5748-1fc00-0ab0_firmware
16 Siemens 6gk5748-1gd00-0aa0_firmware
17 Siemens 6gk5748-1gd00-0ab0_firmware
18 Siemens 6gk5761-1fc00-0aa0_firmware
19 Siemens 6gk5761-1fc00-0ab0_firmware
20 Siemens 6gk5774-1fx00-0aa0_firmware
21 Siemens 6gk5774-1fx00-0aa6_firmware
22 Siemens 6gk5774-1fx00-0ab0_firmware
23 Siemens 6gk5774-1fx00-0ab6_firmware
24 Siemens 6gk5774-1fy00-0ta0_firmware
25 Siemens 6gk5774-1fy00-0tb0_firmware
26 Siemens 6gk5778-1gy00-0ta0_firmware
27 Siemens 6gk5778-1gy00-0tb0_firmware
28 Siemens 6gk5786-1fc00-0aa0_firmware
29 Siemens 6gk5786-1fc00-0ab0_firmware
30 Siemens 6gk5786-2fc00-0aa0_firmware
31 Siemens 6gk5786-2fc00-0ab0_firmware
32 Siemens 6gk5786-2fc00-0ac0_firmware
33 Siemens 6gk5786-2hc00-0aa0_firmware
34 Siemens 6gk5786-2hc00-0ab0_firmware
35 Siemens 6gk5788-1fc00-0aa0_firmware
36 Siemens 6gk5788-1fc00-0ab0_firmware
37 Siemens 6gk5788-1gd00-0aa0_firmware
38 Siemens 6gk5788-1gd00-0ab0_firmware
39 Siemens 6gk5788-2fc00-0aa0_firmware
40 Siemens 6gk5788-2fc00-0ab0_firmware
41 Siemens 6gk5788-2fc00-0ac0_firmware
42 Siemens 6gk5788-2gd00-0aa0_firmware
43 Siemens 6gk5788-2gd00-0ab0_firmware
44 Siemens 6gk5788-2gd00-0ta0_firmware
45 Siemens 6gk5788-2gd00-0tb0_firmware
46 Siemens 6gk5788-2gd00-0tc0_firmware
1 Alfa awus036h_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2020-26141.

URL Resource
http://www.openwall.com/lists/oss-security/2021/05/11/12 Mailing List Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf Third Party Advisory
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu Third Party Advisory
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 Third Party Advisory
https://www.fragattacks.com Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system. By default, Vanir pulls up-to-date CVEs from Open Source Vulnerabilities (OSV) together with their corresponding signatures so that users can transparently scan missing patches for an up-to-date list of CVEs.

Starlark Python C++

Updated: 1 week, 6 days ago
10 stars 0 fork 0 watcher
Born at : Aug. 7, 2024, 7:04 p.m. This repo has been linked 16 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2020-26141 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2020-26141 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Apr. 22, 2022

    Action Type Old Value New Value
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf Third Party Advisory
    Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu No Types Assigned https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu Third Party Advisory
    Changed Reference Type https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 No Types Assigned https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 Third Party Advisory
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_gr10_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_gr60_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr20_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr30h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr33_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr36_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr42_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr42e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr44_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr45_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr46_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr46e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr52_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr53_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr53e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr55_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr56_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr70_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr74_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr76_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr84_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr86_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 27.7.1 OR cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr12_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 26.8.3 OR cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr18_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 26.8.3 OR cpe:2.3:h:cisco:meraki_mr18:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr26_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 26.8.3 OR cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr32_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 26.8.3 OR cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr34_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 26.8.3 OR cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr62_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 26.8.3 OR cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr66_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 26.8.3 OR cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mr72_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 26.8.3 OR cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0 OR cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0 OR cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0 OR cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0 OR cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0 OR cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0 OR cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0 OR cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0 OR cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.0\(6\)sr2 OR cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3\(5\) OR cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:3pcc:*:* versions up to (excluding) 11.3\(5\) OR cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:3pcc:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 14.1\(1\) OR cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 14.1\(1\) OR cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 14.1\(1\) OR cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:webex_room_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.2\(0\)sr1 OR cpe:2.3:h:cisco:webex_room_series:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:webex_desk_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.2\(0\)sr1 OR cpe:2.3:h:cisco:webex_desk_series:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:webex_board_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 10.8.2.5 OR cpe:2.3:h:cisco:webex_board_series:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:webex_wireless_phone_860_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.4\(0\) OR cpe:2.3:h:cisco:webex_wireless_phone_860:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:webex_wireless_phone_840_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.4\(0\) OR cpe:2.3:h:cisco:webex_wireless_phone_840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5778-1gy00-0ab0_firmware:-:*:*:*:*:*:m12:* OR cpe:2.3:h:siemens:6gk5778-1gy00-0ab0:-:*:*:*:*:*:m12:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5778-1gy00-0aa0_firmware:-:*:*:*:*:*:m12:* OR cpe:2.3:h:siemens:6gk5778-1gy00-0aa0:-:*:*:*:*:*:m12:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5721-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5721-1fc00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5721-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5721-1fc00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5722-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5722-1fc00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5722-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5722-1fc00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5722-1fc00-0ac0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5722-1fc00-0ac0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5734-1fx00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5734-1fx00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5734-1fx00-0aa6_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5734-1fx00-0aa6:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5734-1fx00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5734-1fx00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5734-1fx00-0ab6_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5734-1fx00-0ab6:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5738-1gy00-0aa0_firmware:-:*:*:*:*:*:m12:* OR cpe:2.3:h:siemens:6gk5738-1gy00-0aa0:-:*:*:*:*:*:m12:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5738-1gy00-0ab0_firmware:-:*:*:*:*:*:m12:* OR cpe:2.3:h:siemens:6gk5738-1gy00-0ab0:-:*:*:*:*:*:m12:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5748-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5748-1fc00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5748-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5748-1fc00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5748-1gd00-0aa0_firmware:-:*:*:*:*:*:m12:* OR cpe:2.3:h:siemens:6gk5748-1gd00-0aa0:-:*:*:*:*:*:m12:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5748-1gd00-0ab0_firmware:-:*:*:*:*:*:m12:* OR cpe:2.3:h:siemens:6gk5748-1gd00-0ab0:-:*:*:*:*:*:m12:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5761-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5761-1fc00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5761-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5761-1fc00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5774-1fx00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5774-1fx00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5774-1fx00-0aa6_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5774-1fx00-0aa6:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5774-1fx00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5774-1fx00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5774-1fx00-0ab6_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5774-1fx00-0ab6:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5774-1fy00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:* OR cpe:2.3:h:siemens:6gk5774-1fy00-0ta0:-:*:*:*:*:*:m12_ecc:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5774-1fy00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:* OR cpe:2.3:h:siemens:6gk5774-1fy00-0tb0:-:*:*:*:*:*:m12_ecc:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5778-1gy00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:* OR cpe:2.3:h:siemens:6gk5778-1gy00-0ta0:-:*:*:*:*:*:m12_ecc:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5778-1gy00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:* OR cpe:2.3:h:siemens:6gk5778-1gy00-0tb0:-:*:*:*:*:*:m12_ecc:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5786-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5786-1fc00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5786-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5786-1fc00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5786-2fc00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5786-2fc00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5786-2fc00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5786-2fc00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5786-2fc00-0ac0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5786-2fc00-0ac0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5786-2hc00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5786-2hc00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5786-2hc00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5786-2hc00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5788-1fc00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5788-1fc00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-1gd00-0aa0_firmware:-:*:*:*:*:*:m12:* OR cpe:2.3:h:siemens:6gk5788-1gd00-0aa0:-:*:*:*:*:*:m12:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-1gd00-0ab0_firmware:-:*:*:*:*:*:m12:* OR cpe:2.3:h:siemens:6gk5788-1gd00-0ab0:-:*:*:*:*:*:m12:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-2fc00-0aa0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5788-2fc00-0aa0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-2fc00-0ab0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5788-2fc00-0ab0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-2fc00-0ac0_firmware:-:*:*:*:*:*:rj45:* OR cpe:2.3:h:siemens:6gk5788-2fc00-0ac0:-:*:*:*:*:*:rj45:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-2gd00-0aa0_firmware:-:*:*:*:*:*:m12:* OR cpe:2.3:h:siemens:6gk5788-2gd00-0aa0:-:*:*:*:*:*:m12:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-2gd00-0ab0_firmware:-:*:*:*:*:*:m12:* OR cpe:2.3:h:siemens:6gk5788-2gd00-0ab0:-:*:*:*:*:*:m12:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-2gd00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:* OR cpe:2.3:h:siemens:6gk5788-2gd00-0ta0:-:*:*:*:*:*:m12_ecc:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-2gd00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:* OR cpe:2.3:h:siemens:6gk5788-2gd00-0tb0:-:*:*:*:*:*:m12_ecc:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5788-2gd00-0tc0_firmware:-:*:*:*:*:*:m12_ecc:* OR cpe:2.3:h:siemens:6gk5788-2gd00-0tc0:-:*:*:*:*:*:m12_ecc:*
  • CVE Modified by [email protected]

    Oct. 28, 2021

    Action Type Old Value New Value
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu [No Types Assigned]
    Added Reference https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 13, 2021

    Action Type Old Value New Value
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf [No Types Assigned]
  • Initial Analysis by [email protected]

    May. 19, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:A/AC:L/Au:N/C:N/I:P/A:N)
    Added CVSS V3.1 NIST AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/05/11/12 No Types Assigned http://www.openwall.com/lists/oss-security/2021/05/11/12 Mailing List, Third Party Advisory
    Changed Reference Type https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md No Types Assigned https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md Third Party Advisory
    Changed Reference Type https://www.fragattacks.com No Types Assigned https://www.fragattacks.com Third Party Advisory
    Added CWE NIST CWE-354
    Added CPE Configuration AND OR *cpe:2.3:o:alfa:awus036h_firmware:6.1316.1209:*:*:*:*:windows_10:*:* OR cpe:2.3:h:alfa:awus036h:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    May. 11, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/05/11/12 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2020-26141 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2020-26141 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.23 }} 0.07%

score

0.61219

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability