Tip / Sign in to post questions, reply, level up, and achieve exciting badges. Know more

cross mob

Potential Fragmentation Vulnerabilities for Wi-Fi Devices Shipped to Customers

Potential Fragmentation Vulnerabilities for Wi-Fi Devices Shipped to Customers

SaraLeslie
Community Manager
Community Manager
Community Manager
250 sign-ins 100 sign-ins 50 likes received

Public Statement embargoed for release until May 11th , 2021

Potential Fragmentation Vulnerabilities for Wi-Fi Devices Shipped to Customers

Background

On May 11th, 2021 the Wi-Fi Alliance (WFA) published a series of potential vulnerabilities collectively referred to as the Fragmentation vulnerabilities. Over several months, a total of twelve CVEs (critical vulnerabilities and exploits) were identified.  Analysis performed by Infineon on a number of our Wi-Fi chipsets has shown, both through code inspection and through testing, that Infineon devices are vulnerable to some, but not all, of the CVEs.  Infineon Wi-Fi devices are affected by the following CVEs:

 

CVE

Title

Impact to IFX WiFi devices

Patch Availability

CVE-2020-24587

Mixed Key attack

Yes

Availability is device dependent

CVE-2020-24588

Aggregation attack

Yes

Availability is device dependent

CVE-2020-26142

Support A-MSDUs or fragmented frame

Varies by device

Device dependent

CVE-2020-26144

A-MSDU EAPOL attack

Varies by device

Device dependent

CVE-2020-26145

Broadcast fragment attack

Yes

Availability is device dependent

CVE-2020-26146

Non-consecutive PNs attack

Yes

Availability is device dependent

 

As the vulnerabilities described are at the core protocol level, a solution must be formulated within the WFA and rolled out by its members.  A long-term solution, which is to always utilize the Security and Payload Protection (SPP) mechanism in the 802.11 specification, has been identified and will become part of the WFA test specifications going forward.  As SPP has not been mandatory, there are devices that do not support it.  Mitigation mechanisms are needed for devices that do not support SPP.

 

These mitigation mechanisms have been finalized within the WFA and Infineon is working on patches together with the WFA Security Working Group. Patches to address these vulnerabilities are available now for a majority of our devices.   Customers can create a support case through our secure support portal or by contacting their Infineon representative to request these patches and or status on patch availability.

 

If you believe you have identified a vulnerability in any Infineon product, please visit our security response page and email the Product Security Incident Response Team (PSIRT) at psirt@infineon.com.

0 Likes
2864 Views
Authors