Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:realtek:rtl8812ar_firmware:1.21ww:*:*:*:*:*:*:*", "matchCriteriaId": "0CD1F56F-3A99-4FDA-B3E4-C4A47B68FB9A", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:realtek:rtl8812ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CBF07C3-9DDE-45FD-8EB7-9FCB5281078C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:realtek:rtl8196d_firmware:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "880BEF43-87B0-4C37-8854-7AD32173D9EC", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:realtek:rtl8196d:-:*:*:*:*:*:*:*", "matchCriteriaId": "15E33BDB-D4A3-431E-B298-1EFEF60F76DD", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:realtek:rtl8192er_firmware:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "D8220A68-D433-46F7-A049-53843DFC3025", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:realtek:rtl8192er:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF359686-2CC5-4703-A707-A84E8CEB2494", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:realtek:rtl8881an_firmware:1.09:*:*:*:*:*:*:*", "matchCriteriaId": "251D1E2A-B26D-4FD5-B627-D8F2334F2EB1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:realtek:rtl8881an:-:*:*:*:*:*:*:*", "matchCriteriaId": "63365124-A473-4AF7-B4AB-AFBEB6197B83", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "A partial authentication bypass vulnerability exists on Realtek RTL8812AR 1.21WW, RTL8196D 1.0.0, RTL8192ER 2.10, and RTL8881AN 1.09 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data."}, {"lang": "es", "value": "Se presenta una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n parcial en los dispositivos Realtek RTL8812AR versi\u00f3n 1.21WW, RTL8196D versi\u00f3n 1.0.0, RTL8192ER versi\u00f3n 2.10 y RTL8881AN versi\u00f3n 1.09. La vulnerabilidad permite enviar una trama de datos no cifrada hacia un enrutador WLAN protegido por WPA2 donde el paquete se enruta por medio de la red. Si tiene \u00e9xito, es enviada una respuesta como una trama cifrada, lo que permitir\u00eda a un atacante discernir informaci\u00f3n o potencialmente modificar datos"}], "id": "CVE-2019-18990", "lastModified": "2024-11-21T04:33:56.887", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.5, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "cve@mitre.org", "type": "Secondary"}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-09-30T18:15:17.413", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-290"}], "source": "nvd@nist.gov", "type": "Primary"}]}