CVE-2019-9497
- EPSS 8.12%
- Veröffentlicht 17.04.2019 14:29:03
- Zuletzt bearbeitet 21.11.2024 04:51:44
The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password...
CVE-2019-9496
- EPSS 2.16%
- Veröffentlicht 17.04.2019 14:29:03
- Zuletzt bearbeitet 21.11.2024 04:51:43
An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attac...
CVE-2019-9495
- EPSS 6.03%
- Veröffentlicht 17.04.2019 14:29:03
- Zuletzt bearbeitet 21.11.2024 04:51:43
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execu...
CVE-2019-9494
- EPSS 1.54%
- Veröffentlicht 17.04.2019 14:29:03
- Zuletzt bearbeitet 21.11.2024 04:51:43
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that...
CVE-2018-14526
- EPSS 1.14%
- Veröffentlicht 08.08.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:49:15
An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abu...
CVE-2015-5316
- EPSS 1.52%
- Veröffentlicht 21.02.2018 16:29:00
- Zuletzt bearbeitet 21.11.2024 02:32:46
The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer dereference and daemo...
CVE-2015-5315
- EPSS 1.15%
- Veröffentlicht 21.02.2018 16:29:00
- Zuletzt bearbeitet 21.11.2024 02:32:46
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote at...
CVE-2015-5314
- EPSS 1.15%
- Veröffentlicht 21.02.2018 16:29:00
- Zuletzt bearbeitet 21.11.2024 02:32:46
The eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when used with (1) an internal EAP server or (2) a RADIUS server and EAP-pwd is ...
CVE-2017-13087
- EPSS 0.22%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames f...
CVE-2017-13088
- EPSS 0.19%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to repl...