{"vulnerability": "CVE-2020-24588", "sightings": [{"uuid": "dcd9d929-d284-4bf5-a510-93e57d2a1592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24588", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4022", "content": "#Research\n#WLAN_Security\n\"Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation\", 2021.\n// CVE-2020-24586, CVE-2020-24587, CVE-2020-24588\n]-&gt; Testing Tool:\nhttps://github.com/vanhoefm/fragattacks", "creation_timestamp": "2021-08-08T14:28:39.000000Z"}, {"uuid": "8fa67ebc-0025-4a32-91c1-cb687def650e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24588", "type": "seen", "source": "https://t.me/MikrotikNews/153", "content": "RouterOS 6.47.10 [Long-term]\nReleased: 2021-06-02\n\n!) wireless - fixed all affecting 'FragAttacks' vulnerabilities (CVE-2020-24587, CVE-2020-24588, CVE-2020-26144, CVE-2020-26146, CVE-2020-26147)\n\nFind download links and change-log in the Comments below. Feel free to talk about changes or problems in chats: English, \u0420\u0443\u0441\u0441\u043a\u0438\u0439", "creation_timestamp": "2021-06-02T12:45:27.000000Z"}, {"uuid": "7e972a15-2378-45aa-ab58-c23a546625e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24588", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mjhhd6zgtz2a", "content": "", "creation_timestamp": "2026-04-14T13:10:22.037577Z"}, {"uuid": "c2609db4-e847-4a01-8eda-479a8e9f8315", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24588", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-111-07", "content": "", "creation_timestamp": "2026-04-21T10:00:00.000000Z"}, {"uuid": "ee9aff20-77ef-4614-9cc5-6f5f10c0f9b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24588", "type": "seen", "source": "Telegram/McdHlGkeqdjc5UvLBQvY4Ib0_0ud0ZpTZxnWoDeCPrli8nlZ", "content": "", "creation_timestamp": "2021-05-26T09:09:57.000000Z"}, {"uuid": "455885b9-45d4-4a32-b320-604f7011cb0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24588", "type": "seen", "source": "Telegram/vqgwfoRtAupaFBHsMwPfc_wZU3HeLntCPzVK5sVvhVjhiNbU", "content": "", "creation_timestamp": "2021-06-02T07:23:58.000000Z"}, {"uuid": "0ea324f0-78bc-4e6a-b061-2e26d754a479", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-24588", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=586", "content": "", "creation_timestamp": "2021-05-13T04:00:00.000000Z"}, {"uuid": "2302f0cf-f1cc-4734-849c-51ce29889839", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24588", "type": "seen", "source": "https://t.me/MikrotikNews/149", "content": "RouterOS 6.49beta46 [Testing]\nReleased: 2021-05-19\n\nFixed: CVE-2020-24587, CVE-2020-24588, CVE-2020-26144, CVE-2020-26146, CVE-2020-26147\n\nFind download links and change-log in the Comments below. Feel free to talk about changes or problems in chats: English, \u0420\u0443\u0441\u0441\u043a\u0438\u0439", "creation_timestamp": "2021-05-19T08:04:54.000000Z"}, {"uuid": "2b9fc0a5-e198-42ec-b1e9-3796bec723be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24588", "type": "seen", "source": "https://t.me/MikrotikNews/151", "content": "RouterOS 6.48.3 [Stable]\nReleased: 2021-05-26\n\n!) wireless - fixed all affecting 'FragAttacks' vulnerabilities (CVE-2020-24587, CVE-2020-24588, CVE-2020-26144, CVE-2020-26146, CVE-2020-26147)\n\nFind download links and change-log in the Comments below. Feel free to talk about changes or problems in chats: English, \u0420\u0443\u0441\u0441\u043a\u0438\u0439", "creation_timestamp": "2021-05-26T10:48:55.000000Z"}, {"uuid": "2c7c2130-67e7-4ce4-894c-236a7791721c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24588", "type": "published-proof-of-concept", "source": "https://t.me/mikrotik_rus/149", "content": "\u041d\u0430 \u0434\u043d\u044f\u0445 \u0432\u044b\u0448\u043b\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 MikroTik, \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u044e\u0449\u0435\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c WiFI FragAttacks\n\nMAJOR CHANGES IN v6.48.3:\n----------------------\n!) wireless - fixed all affecting 'FragAttacks' vulnerabilities (CVE-2020-24587, CVE-2020-24588, CVE-2020-26144, CVE-2020-26146, CVE-2020-26147);\n\n\u0418\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u0439 \u0434\u043b\u044f \u043f\u0435\u043d\u0442\u0435\u0441\u0442\u0435\u0440\u043e\u0432:\nhttps://github.com/vanhoefm/fragattacks", "creation_timestamp": "2021-05-28T10:42:25.000000Z"}]}