The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-26139

CVE-2020-26139: NetBSD Kernel Wi-Fi DoS Vulnerability

CVE-2020-26139 is a DoS flaw in NetBSD kernel affecting Wi-Fi networks. Access points forward EAPOL frames before authentication, enabling attacks. This article covers technical details, affected versions, and mitigation.

Published: March 4, 2026

CVE-2020-26139 Overview

CVE-2020-26139 is an authentication bypass vulnerability discovered in the NetBSD 7.1 kernel that affects Wi-Fi Access Point (AP) implementations. The flaw allows an Access Point to forward EAPOL (Extensible Authentication Protocol over LAN) frames to other connected clients even when the sender has not yet successfully authenticated to the AP. This vulnerability is part of the broader "FragAttacks" (fragmentation and aggregation attacks) family of Wi-Fi security vulnerabilities that affect numerous wireless networking implementations across multiple vendors.

The vulnerability can be abused in protected Wi-Fi networks to launch denial-of-service attacks against legitimately connected clients. Additionally, it facilitates the exploitation of other vulnerabilities present in connected client devices by allowing unauthenticated attackers to inject malicious EAPOL frames into the network.

Critical Impact

Unauthenticated attackers within wireless range can forward EAPOL frames to connected clients, enabling denial-of-service attacks and potentially facilitating exploitation of additional vulnerabilities in client devices on protected Wi-Fi networks.

Affected Products

  • NetBSD 7.1
  • Debian Linux 9.0
  • Cisco Aironet Series Access Points (1532, 1542, 1552, 1572, 1702, 1800, 2702, 2800, 3702, 3800, 4800 series)
  • Cisco Catalyst 9100 Series Access Points (9105, 9115, 9117, 9120, 9124, 9130)
  • Cisco Meraki MR/MX/Z Series Wireless Devices
  • Cisco IP Phones (6861, 8821, 8832, 8861, 8865)
  • Cisco Webex Board and Room Devices
  • Arista C-Series and O-Series Access Points
  • Intel Wi-Fi 6 AX200/AX201 Adapters
  • Intel Killer Wi-Fi 6/6E Adapters
  • Intel ProSet AC/Wi-Fi 6 Series Adapters

Discovery Timeline

  • May 11, 2021 - CVE-2020-26139 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2020-26139

Vulnerability Analysis

This vulnerability relates to improper authentication handling (CWE-287) in the Wi-Fi frame forwarding logic within the kernel. The flaw specifically impacts how Access Points process and forward EAPOL frames during the authentication handshake phase.

In a properly secured Wi-Fi network, the AP should only forward frames between clients that have completed the 802.1X authentication process. However, affected implementations forward EAPOL frames from unauthenticated sources to authenticated clients, breaking this security boundary. This allows an attacker who is within wireless range but has not authenticated to the network to inject EAPOL frames that will be delivered to legitimate, authenticated clients.

The attack requires adjacent network access (the attacker must be within wireless range of the target AP) and has high attack complexity due to specific timing and protocol requirements. While the vulnerability does not directly compromise confidentiality or integrity, it can cause complete denial of service to connected clients.

Root Cause

The root cause of CVE-2020-26139 lies in inadequate validation of sender authentication state before forwarding EAPOL frames. The kernel's wireless networking stack fails to properly verify that the source of an EAPOL frame has completed the 802.1X authentication handshake before relaying the frame to other connected clients. This missing authentication check violates the security assumptions of protected Wi-Fi networks, where only authenticated devices should be able to communicate with other network participants.

Attack Vector

An attacker exploiting this vulnerability must be within wireless range of the target Access Point. The attack proceeds as follows:

  1. The attacker associates with the target AP but does not complete the authentication process
  2. The attacker crafts malicious EAPOL frames targeting specific authenticated clients
  3. Due to the vulnerability, the AP forwards these unauthenticated EAPOL frames to the target clients
  4. The malicious frames can cause denial-of-service conditions or be used to facilitate exploitation of other client-side vulnerabilities

The vulnerability is particularly concerning in enterprise environments where Wi-Fi Protected Access (WPA2/WPA3) is expected to provide isolation between authenticated and unauthenticated devices. By bypassing this isolation, attackers can target devices that are otherwise protected by network authentication.

Detection Methods for CVE-2020-26139

Indicators of Compromise

  • Unusual volume of EAPOL frames from non-associated or unauthenticated wireless sources
  • Client devices experiencing unexpected disconnections or authentication failures
  • Wireless IDS/IPS alerts for abnormal EAPOL frame patterns
  • Log entries indicating EAPOL frame processing from unauthenticated MAC addresses

Detection Strategies

  • Deploy wireless intrusion detection systems (WIDS) to monitor for anomalous EAPOL frame activity
  • Configure AP logging to capture detailed information about EAPOL frame sources and authentication states
  • Monitor for clients reporting authentication failures or unexpected deauthentication events
  • Implement network-level monitoring to detect patterns consistent with FragAttacks exploitation

Monitoring Recommendations

  • Enable verbose logging on wireless controllers and access points to track EAPOL frame handling
  • Establish baseline metrics for normal EAPOL traffic patterns to identify anomalies
  • Configure alerts for high volumes of EAPOL frames from devices that have not completed authentication
  • Review wireless client health metrics for signs of denial-of-service impact

How to Mitigate CVE-2020-26139

Immediate Actions Required

  • Identify all affected wireless access points, controllers, and client devices in your environment
  • Prioritize patching of access points that service critical or high-security network segments
  • Review vendor security advisories from Cisco, Intel, Arista, and other affected manufacturers
  • Consider implementing additional network segmentation to limit the impact of potential exploitation

Patch Information

Multiple vendors have released firmware and driver updates to address this vulnerability. Organizations should apply patches according to their vendor's recommendations:

  • Cisco: See the Cisco Security Advisory for affected products and patch availability
  • Intel: Updated wireless drivers are available through Intel's driver download center
  • Arista: Review the Arista Security Advisory 12602 for firmware updates
  • Debian: Security updates are available through Debian LTS announcements
  • Siemens: Refer to the Siemens Security Advisory SSA-913875 for industrial device updates

For comprehensive technical details on the FragAttacks vulnerability family, see the FragAttacks research summary on GitHub or the official FragAttacks website.

Workarounds

  • Enable client isolation features on access points where available to limit frame forwarding between clients
  • Consider using wired connections for critical devices until patches can be applied
  • Implement MAC address filtering as an additional layer of defense (though not a complete mitigation)
  • Monitor wireless networks closely for signs of exploitation while awaiting patch deployment
bash
# Example: Enable client isolation on Cisco Catalyst 9800 Wireless Controller
# This limits direct client-to-client communication through the AP

configure terminal
wlan YOUR_WLAN_NAME
peer-blocking drop
end
write memory

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechNetbsd

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability0.24%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-287
  • Technical References
  • Openwall OSS Security Post

  • GitHub FragAttacks Summary

  • Debian LTS Security Announcement

  • Debian LTS Security Announcement

  • Cisco Security Advisory

  • Arista Security Advisory 12602

  • FragAttacks Official Site
  • Vendor Resources
  • Siemens Security Advisory SSA-913875
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English