W1.Fi

Wpa Supplicant

39 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.22%
  • Published 07.08.2024 09:16:05
  • Last modified 17.09.2024 13:09:13

An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the net...

  • EPSS 1.49%
  • Published 22.02.2024 17:15:08
  • Last modified 05.05.2025 14:14:41

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vuln...

  • EPSS 0.06%
  • Published 17.01.2022 02:15:06
  • Last modified 21.11.2024 06:48:22

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

  • EPSS 0.33%
  • Published 17.01.2022 02:15:06
  • Last modified 21.11.2024 06:48:22

The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.

  • EPSS 0.3%
  • Published 02.04.2021 05:15:13
  • Last modified 21.11.2024 06:03:13

In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.

  • EPSS 0.26%
  • Published 26.02.2021 23:15:11
  • Last modified 21.11.2024 05:58:35

A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacke...

  • EPSS 0.52%
  • Published 12.09.2019 20:15:11
  • Last modified 21.11.2024 04:30:26

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka managemen...

  • EPSS 9.08%
  • Published 26.04.2019 22:29:00
  • Last modified 21.11.2024 04:21:20

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process t...

  • EPSS 1.06%
  • Published 17.04.2019 14:29:04
  • Last modified 21.11.2024 04:51:44

The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar...

  • EPSS 1.06%
  • Published 17.04.2019 14:29:04
  • Last modified 21.11.2024 04:51:44

The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication,...