Close
Public Statement embargoed for release until May 11th , 2021
Potential Fragmentation Vulnerabilities for Wi-Fi Devices Shipped to Customers
Background
On May 11th, 2021 the Wi-Fi Alliance (WFA) published a series of potential vulnerabilities collectively referred to as the Fragmentation vulnerabilities. Over several months, a total of twelve CVEs (critical vulnerabilities and exploits) were identified. Analysis performed by Infineon on a number of our Wi-Fi chipsets has shown, both through code inspection and through testing, that Infineon devices are vulnerable to some, but not all, of the CVEs. Infineon Wi-Fi devices are affected by the following CVEs:
CVE |
Title |
Impact to IFX WiFi devices |
Patch Availability |
CVE-2020-24587 |
Mixed Key attack |
Yes |
Availability is device dependent |
CVE-2020-24588 |
Aggregation attack |
Yes |
Availability is device dependent |
CVE-2020-26142 |
Support A-MSDUs or fragmented frame |
Varies by device |
Device dependent |
CVE-2020-26144 |
A-MSDU EAPOL attack |
Varies by device |
Device dependent |
CVE-2020-26145 |
Broadcast fragment attack |
Yes |
Availability is device dependent |
CVE-2020-26146 |
Non-consecutive PNs attack |
Yes |
Availability is device dependent |
As the vulnerabilities described are at the core protocol level, a solution must be formulated within the WFA and rolled out by its members. A long-term solution, which is to always utilize the Security and Payload Protection (SPP) mechanism in the 802.11 specification, has been identified and will become part of the WFA test specifications going forward. As SPP has not been mandatory, there are devices that do not support it. Mitigation mechanisms are needed for devices that do not support SPP.
These mitigation mechanisms have been finalized within the WFA and Infineon is working on patches together with the WFA Security Working Group. Patches to address these vulnerabilities are available now for a majority of our devices. Customers can create a support case through our secure support portal or by contacting their Infineon representative to request these patches and or status on patch availability.
If you believe you have identified a vulnerability in any Infineon product, please visit our security response page and email the Product Security Incident Response Team (PSIRT) at psirt@infineon.com.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.