The ThreadX-based firmware on Marvell Avastar Wi-Fi devices, models 88W8787, 88W8797, 88W8801, 88W8897, and 88W8997, allows remote attackers to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of available Wi-Fi networks. Exploitation of the Wi-Fi device can lead to exploitation of the host application processor in some cases, but this depends on several factors including host OS hardening and the availability of DMA.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.scribd.com/document/398350818/WiFi-CVE-2019-6496-Marvell-s-Statement | third party advisory |
http://www.securityfocus.com/bid/106865 | third party advisory vdb entry |
https://2018.zeronights.ru/wp-content/uploads/materials/19-Researching-Marvell-Avastar-Wi-Fi.pdf | third party advisory exploit |
https://embedi.org/blog/remotely-compromise-devices-by-using-bugs-in-marvell-avastar-wi-fi-from-zero-knowledge-to-zero-click-rce/ | third party advisory |
https://www.zdnet.com/article/wifi-firmware-bug-affects-laptops-smartphones-routers-gaming-devices/ | press/media coverage third party advisory exploit |
https://www.synology.com/security/advisory/Synology_SA_19_07 | third party advisory |
https://www.kb.cert.org/vuls/id/730261/ | third party advisory us government resource |