mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-24 16:28:23 -05:00
fragattacks: add ADVISORIES.md overview
This commit is contained in:
parent
b9dd1bc207
commit
f908e32746
69
ADVISORIES.md
Normal file
69
ADVISORIES.md
Normal file
@ -0,0 +1,69 @@
|
||||
# Security Advisories / Bulletins linked to FragAttacks
|
||||
|
||||
Pull requests with additional links are welcome! Or create an issue on GitHub to request a link to be added.
|
||||
|
||||
## A
|
||||
|
||||
- [Arista](https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63)
|
||||
- [Arris](https://arris.secure.force.com/consumers/articles/General_FAQs/FragAttack-Vulnerability)
|
||||
- [Aruba](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-011.txt)
|
||||
- [Avm.de](https://en.avm.de/service/current-security-notifications/): Look for "FragAttacks" Wi-Fi vulnerability
|
||||
|
||||
## C
|
||||
|
||||
- [Cisco](https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-wifi-faf-22epcEWu.html)
|
||||
- COMMSCOPE: [Link 1](https://www.commscope.com/fragattacks-commscope-ruckus-resource-center/wifi-fragattacks-what-you-need-to-know/), [Link 2](https://www.commscope.com/globalassets/digizuite/916169-faq-security-advisory-id-20210511-v1-0.pdf)
|
||||
- [Cypress](https://community.cypress.com/t5/Security-Bulletin/Potential-Fragmentation-Vulnerabilities-for-Wi-Fi-Devices/ba-p/276441)
|
||||
|
||||
## E
|
||||
|
||||
- [Eero](https://blog.eero.com/fragattacks-fragmentation-aggregation-and-attacks-update-available-for-all-eero-customers/)
|
||||
|
||||
## I
|
||||
|
||||
- [Intel](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html)
|
||||
|
||||
## J
|
||||
|
||||
- [Juniper](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11170&cat=SIRT_1&actp=LIST)
|
||||
|
||||
## K
|
||||
|
||||
- [Lancom](https://www.lancom-systems.com/service-support/instant-help/general-security-information/): look for WLAN vulnerability "Fragattacks" - They provide patches .
|
||||
- [Lenovo](https://support.lenovo.com/fr/en/product_security/len-57316)
|
||||
- [Linksys](https://www.linksys.com/gb/support-article?articleNum=246427#ff)
|
||||
- [Linux Wireless](https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/)
|
||||
|
||||
## M
|
||||
|
||||
- Microsoft: [CVE-2020-24587](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24587), [CVE-2020-24588](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24587), [CVE-2020-26144](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26144)
|
||||
- [Mist](https://www.mist.com/documentation/mist-security-advisory-fragattacks-and-faq)
|
||||
|
||||
## N
|
||||
|
||||
- [Netgear](https://kb.netgear.com/000063666/Security-Advisory-for-Fragment-and-Forge-vulnerabilities-on-some-WiFi-capable-devices-PSV-2021-0014-PSV-2021-0080)
|
||||
|
||||
## R
|
||||
|
||||
- [RuckusWireless](https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center)
|
||||
|
||||
## S
|
||||
|
||||
- [Samsung](https://security.samsungmobile.com/securityUpdate.smsb): Look for SMR-APR-21 & SVE-2021-20775
|
||||
- [SierraWireless](https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2021-003/)
|
||||
- [Suse](https://www.suse.com/support/kb/doc/?id=000020244)
|
||||
- [Synology](https://www.synology.com/en-global/security/advisory/Synology_SA_21_20)
|
||||
- [Sophos](https://community.sophos.com/b/security-blog/posts/multiple-vulnerabilities-aka-fragattacks-in-wifi-specification)
|
||||
|
||||
## T
|
||||
|
||||
- [Telekom.com](https://www.telekom.com/en/company/details/fragattack-gap-in-wifi-standard-627006)
|
||||
|
||||
## Z
|
||||
|
||||
- [Zyxel](https://community.zyxel.com/en/discussion/10655/zyxel-security-advisory-for-fragattacks-against-wifi-products)
|
||||
|
||||
## Other Overviews
|
||||
|
||||
- [ICASI](https://www.icasi.org/aggregation-fragmentation-attacks-against-wifi/)
|
||||
- [Wi-Fi Alliance](https://www.wi-fi.org/security-update-fragmentation)
|
Loading…
Reference in New Issue
Block a user