CVE-2019-18989, CVE-2019-18990, and CVE-2019-18991 refer to a partial authentication bypass vulnerability that affects the following chipsets in different devices from the listed manufacturers:
- Chipset: MT7620N
- Devices tested: D-Link DWR-116 V1.06(EU)
- Qualcomm (Atheros):
- Chipset: AR9132
- Devices tested: Zyxel NBG460N V3.60(AMX.8)
- Chipset: AR9283
- Devices tested: Buffalo WHR-G300N V2 V1.85 (R1.18/B1.03)
- Chipset: AR9285
- Devices tested: Netgear WNR1000 V.126.96.36.199NA
- Chipset: RTL8812AR
- Devices tested: D-Link DIR-850L V1.21WW
- Chipset: RTL8196D
- Devices tested: Netwjork N+4G V1.0.0
- Chipset: RTL8881AN
- Devices tested: D-Link DIR-809 Rev A3 V1.09 Rev A2
- Chipset: RTL8192ER
- Devices tested: D-Link DIR-605L H/W: B2 V2.10
Note: Synopsys was unable to identify a comprehensive list of vulnerable devices and chipsets. The vulnerable chipsets may be embedded in other devices that Synopsys was unable to acquire.
After completing disclosures with each of these manufacturers, Synopsys confirmed their following responses:
- Mediatek and Realtek: Patches will be made available upon request.
- Qualcomm (Atheros): The identified chipsets have all reached end-of-life and have been discontinued. Currently supported chipsets have all been verified by the manufacturer as unaffected by this vulnerability.
Furthermore, Synopsys engaged all the manufacturers of the tested devices as part of this disclosure. After engaging each manufacturer, Synopsys received a response only from Zyxel. However, Mediatek notified D-Link of this matter during the disclosure process. Both D-Link and Zyxel confirmed patches with the fix exist and will be made available.