Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://support.apple.com/kb/HT210721", "name": "https://support.apple.com/kb/HT210721", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://support.apple.com/kb/HT210722", "name": "https://support.apple.com/kb/HT210722", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure", "name": "20200227 Wi-Fi Protected Network and Wi-Fi Protected Network 2 Information Disclosure Vulnerability", "tags": [], "refsource": "CISCO"}, {"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001", "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20200228-01-kr00k-en", "name": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20200228-01-kr00k-en", "tags": [], "refsource": "CONFIRM"}, {"url": "https://support.apple.com/kb/HT210788", "name": "https://support.apple.com/kb/HT210788", "tags": [], "refsource": "CONFIRM"}, {"url": "https://www.mist.com/documentation/mist-security-advisory-kr00k-attack-faq/", "name": "https://www.mist.com/documentation/mist-security-advisory-kr00k-attack-faq/", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt", "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt", "tags": [], "refsource": "CONFIRM"}, {"url": "https://www.synology.com/security/advisory/Synology_SA_20_03", "name": "https://www.synology.com/security/advisory/Synology_SA_20_03", "tags": [], "refsource": "CONFIRM"}, {"url": "http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html", "name": "http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html", "tags": [], "refsource": "MISC"}, {"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-wifi-en", "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-wifi-en", "tags": [], "refsource": "CONFIRM"}, {"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712518.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-712518.pdf", "tags": [], "refsource": "CONFIRM"}, {"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-224-05", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-224-05", "tags": [], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-367"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2019-15126", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "LOW", "acInsufInfo": false, "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 5.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 3.1, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 1.6}}, "publishedDate": "2020-02-05T17:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "13.2"}, {"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "13.2"}, {"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "10.15.1"}]}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:broadcom:bcm4389_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:h:broadcom:bcm4389:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:broadcom:bcm43012_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:h:broadcom:bcm43012:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:broadcom:bcm43013_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:h:broadcom:bcm43013:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:broadcom:bcm4375_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:h:broadcom:bcm4375:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:broadcom:bcm43752_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:h:broadcom:bcm43752:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:broadcom:bcm4356_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:h:broadcom:bcm4356:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2020-08-11T19:15Z"}