Vulnerabilities > CVE-2019-6496 - Out-of-bounds Write vulnerability in Marvell products
Attack vector
ADJACENT_NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
The ThreadX-based firmware on Marvell Avastar Wi-Fi devices, models 88W8787, 88W8797, 88W8801, 88W8897, and 88W8997, allows remote attackers to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of available Wi-Fi networks. Exploitation of the Wi-Fi device can lead to exploitation of the host application processor in some cases, but this depends on several factors including host OS hardening and the availability of DMA.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 5 | |
Hardware | 5 |
Common Weakness Enumeration (CWE)
References
- http://www.securityfocus.com/bid/106865
- https://2018.zeronights.ru/wp-content/uploads/materials/19-Researching-Marvell-Avastar-Wi-Fi.pdf
- https://embedi.org/blog/remotely-compromise-devices-by-using-bugs-in-marvell-avastar-wi-fi-from-zero-knowledge-to-zero-click-rce/
- https://www.kb.cert.org/vuls/id/730261/
- https://www.scribd.com/document/398350818/WiFi-CVE-2019-6496-Marvell-s-Statement
- https://www.synology.com/security/advisory/Synology_SA_19_07
- https://www.zdnet.com/article/wifi-firmware-bug-affects-laptops-smartphones-routers-gaming-devices/
- http://www.securityfocus.com/bid/106865
- https://www.zdnet.com/article/wifi-firmware-bug-affects-laptops-smartphones-routers-gaming-devices/
- https://www.synology.com/security/advisory/Synology_SA_19_07
- https://www.scribd.com/document/398350818/WiFi-CVE-2019-6496-Marvell-s-Statement
- https://www.kb.cert.org/vuls/id/730261/
- https://embedi.org/blog/remotely-compromise-devices-by-using-bugs-in-marvell-avastar-wi-fi-from-zero-knowledge-to-zero-click-rce/
- https://2018.zeronights.ru/wp-content/uploads/materials/19-Researching-Marvell-Avastar-Wi-Fi.pdf