CVE-2015-5310

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-01-06 19:59

Updated : 2024-02-04 18:53


NVD link : CVE-2015-5310

Mitre link : CVE-2015-5310

CVE.ORG link : CVE-2015-5310


JSON object : View

Products Affected

google

  • android
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor