The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-4430-1 wpa security update
EUVD EUVD EUVD-2019-18868 The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 02 Apr 2025 02:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important

cvssV3_0

{'score': 7.0, 'vector': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-04T21:54:44.172Z

Reserved: 2019-03-01T00:00:00

Link: CVE-2019-9494

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-17T14:29:03.840

Modified: 2024-11-21T04:51:43.657

Link: CVE-2019-9494

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-04-10T00:00:00Z

Links: CVE-2019-9494 - Bugzilla

cve-icon OpenCVE Enrichment

No data.