CVE-2019-18990

A partial authentication bypass vulnerability exists on Realtek RTL8812AR 1.21WW, RTL8196D 1.0.0, RTL8192ER 2.10, and RTL8881AN 1.09 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.
References
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:realtek:rtl8812ar_firmware:1.21ww:*:*:*:*:*:*:*
cpe:2.3:h:realtek:rtl8812ar:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:realtek:rtl8196d_firmware:1.0.0:*:*:*:*:*:*:*
cpe:2.3:h:realtek:rtl8196d:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:realtek:rtl8192er_firmware:2.10:*:*:*:*:*:*:*
cpe:2.3:h:realtek:rtl8192er:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:realtek:rtl8881an_firmware:1.09:*:*:*:*:*:*:*
cpe:2.3:h:realtek:rtl8881an:-:*:*:*:*:*:*:*

Information

Published : 2020-09-30 11:15

Updated : 2021-07-21 04:39


NVD link : CVE-2019-18990

Mitre link : CVE-2019-18990


JSON object : View

CWE
CWE-290

Authentication Bypass by Spoofing

Advertisement

dedicated server usa

Products Affected

realtek

  • rtl8196d_firmware
  • rtl8192er
  • rtl8196d
  • rtl8881an
  • rtl8192er_firmware
  • rtl8812ar
  • rtl8812ar_firmware
  • rtl8881an_firmware