CVE-2025-24912
- EPSS 0.16%
- Veröffentlicht 12.03.2025 04:43:54
- Zuletzt bearbeitet 24.10.2025 18:40:03
hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS au...
CVE-2022-37660
- EPSS 0.24%
- Veröffentlicht 11.02.2025 23:15:08
- Zuletzt bearbeitet 03.11.2025 20:15:55
In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by p...
CVE-2022-23304
- EPSS 0.06%
- Veröffentlicht 17.01.2022 02:15:06
- Zuletzt bearbeitet 03.11.2025 20:15:52
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
CVE-2022-23303
- EPSS 0.3%
- Veröffentlicht 17.01.2022 02:15:06
- Zuletzt bearbeitet 03.11.2025 20:15:52
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
CVE-2021-30004
- EPSS 0.3%
- Veröffentlicht 02.04.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 06:03:13
In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.
CVE-2020-12695
- EPSS 4.73%
- Veröffentlicht 08.06.2020 17:15:09
- Zuletzt bearbeitet 21.11.2024 05:00:05
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger is...
CVE-2019-10064
- EPSS 1.41%
- Veröffentlicht 28.02.2020 15:15:11
- Zuletzt bearbeitet 21.11.2024 04:18:19
hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-201...
CVE-2019-5062
- EPSS 0.09%
- Veröffentlicht 12.12.2019 22:15:11
- Zuletzt bearbeitet 21.11.2024 04:44:16
An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication agains...
CVE-2019-5061
- EPSS 0.3%
- Veröffentlicht 12.12.2019 22:15:11
- Zuletzt bearbeitet 21.11.2024 04:44:16
An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of ...
CVE-2019-16275
- EPSS 0.43%
- Veröffentlicht 12.09.2019 20:15:11
- Zuletzt bearbeitet 21.11.2024 04:30:26
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka managemen...