The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
History

Tue, 14 Apr 2026 09:30:00 +0000


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00943}

epss

{'score': 0.00848}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2021-05-11T00:00:00.000Z

Updated: 2026-04-14T08:48:59.636Z

Reserved: 2020-08-21T00:00:00.000Z

Link: CVE-2020-24588

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-11T20:15:08.613

Modified: 2026-04-14T09:16:20.567

Link: CVE-2020-24588

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-05-12T00:00:00Z

Links: CVE-2020-24588 - Bugzilla