Wind River Support Network


LIN1021-13 : Security Advisory - linux - CVE-2020-24586 (main WiFi case)

Created: May 17, 2021    Updated: May 13, 2022
Resolved Date: Jul 12, 2021
Found In Version:
Fix Version:
Severity: Standard
Applicable for: Wind River Linux LTS 21
Component/s: Kernel


The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.

CREATE(Triage):(User=admin) CVE-2020-24586 (


Live chat