CVE-2019-13377
- EPSS 1.27%
- Veröffentlicht 15.08.2019 17:15:13
- Zuletzt bearbeitet 21.11.2024 04:24:49
The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able...
CVE-2019-11555
- EPSS 9.08%
- Veröffentlicht 26.04.2019 22:29:00
- Zuletzt bearbeitet 21.11.2024 04:21:20
The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process t...
CVE-2019-9499
- EPSS 1.06%
- Veröffentlicht 17.04.2019 14:29:04
- Zuletzt bearbeitet 21.11.2024 04:51:44
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication,...
CVE-2019-9498
- EPSS 1.06%
- Veröffentlicht 17.04.2019 14:29:04
- Zuletzt bearbeitet 21.11.2024 04:51:44
The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar...
CVE-2019-9497
- EPSS 8.12%
- Veröffentlicht 17.04.2019 14:29:03
- Zuletzt bearbeitet 21.11.2024 04:51:44
The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password...
CVE-2019-9496
- EPSS 2.16%
- Veröffentlicht 17.04.2019 14:29:03
- Zuletzt bearbeitet 21.11.2024 04:51:43
An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attac...
CVE-2019-9495
- EPSS 6.03%
- Veröffentlicht 17.04.2019 14:29:03
- Zuletzt bearbeitet 21.11.2024 04:51:43
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execu...
CVE-2019-9494
- EPSS 1.54%
- Veröffentlicht 17.04.2019 14:29:03
- Zuletzt bearbeitet 21.11.2024 04:51:43
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that...
CVE-2016-10743
- EPSS 0.46%
- Veröffentlicht 23.03.2019 19:29:00
- Zuletzt bearbeitet 21.11.2024 02:44:38
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
CVE-2017-13088
- EPSS 0.19%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to repl...