Guest

Preview Tool

Cisco Bug: CSCvs87888 - Evaluation of Cisco Catalyst 9100 Series APs for Kr00k attack - CVE-2019-15126

Last Modified

Aug 12, 2020

Products (1)

  • Cisco Aironet 1850 Series Access Points

Known Affected Releases

8.10(112.1) 8.8(128.31) ap-16.12.3.7 ap-17.2.0.61

Description (partial)

Symptom:
On February 26th, 2020 security researchers disclosed a vulnerability in the implementation of the wireless egress packet processing of certain Wi-Fi chipsets manufactured by Broadcom and Cypress Semiconductor. This vulnerability could allow an unauthenticated, adjacent attacker to decrypt Wi-Fi frames without the knowledge of the Wireless Protected Access (WPA) or Wireless Protected Access 2 (WPA2) Pairwise Temporal Key (PTK) used to secure the Wi-Fi network. 

The vulnerability is known as Kr00k and is identified by the following Common Vulnerability and Exposures (CVE) ID: CVE-2019-15126 

The product Cisco Catalyst 9115 Series Wi-Fi 6 Access Points;Cisco Catalyst 9120 Series Access Points embeds a wireless chipset affected by the vulnerability described above, Cisco has assessed the impact to the product and confirmed that is affected.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure

Conditions:
Please refer to the Security Advisory.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.