CVE-2024-5290
- EPSS 0.22%
- Published 07.08.2024 09:16:05
- Last modified 17.09.2024 13:09:13
An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the net...
CVE-2023-52160
- EPSS 1.49%
- Published 22.02.2024 17:15:08
- Last modified 05.05.2025 14:14:41
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vuln...
CVE-2022-23304
- EPSS 0.06%
- Published 17.01.2022 02:15:06
- Last modified 21.11.2024 06:48:22
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
CVE-2022-23303
- EPSS 0.33%
- Published 17.01.2022 02:15:06
- Last modified 21.11.2024 06:48:22
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
CVE-2021-30004
- EPSS 0.3%
- Published 02.04.2021 05:15:13
- Last modified 21.11.2024 06:03:13
In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.
CVE-2021-27803
- EPSS 0.26%
- Published 26.02.2021 23:15:11
- Last modified 21.11.2024 05:58:35
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacke...
CVE-2019-16275
- EPSS 0.52%
- Published 12.09.2019 20:15:11
- Last modified 21.11.2024 04:30:26
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka managemen...
CVE-2019-11555
- EPSS 9.08%
- Published 26.04.2019 22:29:00
- Last modified 21.11.2024 04:21:20
The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process t...
CVE-2019-9498
- EPSS 1.06%
- Published 17.04.2019 14:29:04
- Last modified 21.11.2024 04:51:44
The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar...
CVE-2019-9499
- EPSS 1.06%
- Published 17.04.2019 14:29:04
- Last modified 21.11.2024 04:51:44
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication,...