Vulnerability Description
The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. By supplying a vendor information element with a data length larger than 32 bytes, a heap buffer overflow is triggered in wlc_wpa_sup_eapol. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Synology | Router Manager | 1.2 |
| Broadcom | Bcm4339 Firmware | - |
| Broadcom | Bcm4339 | - |
Related Weaknesses (CWE)
References
- https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.htmlExploitThird Party Advisory
- https://kb.cert.org/vuls/id/166939/Third Party AdvisoryUS Government Resource
- https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.htmlExploitThird Party Advisory
- https://kb.cert.org/vuls/id/166939/Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2019-9501?
CVE-2019-9501 is a vulnerability with a CVSS score of 7.9 (HIGH). The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. By supplying a vendor information element with a data length larger than 32 bytes, a heap buffer overflow is triggered in wlc_wpa_s...
How severe is CVE-2019-9501?
CVE-2019-9501 has been rated HIGH with a CVSS base score of 7.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9501?
Check the references section above for vendor advisories and patch information. Affected products include: Synology Router Manager, Broadcom Bcm4339 Firmware, Broadcom Bcm4339.