Description
The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1867-1 | wpa security update |
Debian DSA |
DSA-4430-1 | wpa security update |
EUVD |
EUVD-2019-18872 | The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected. |
Ubuntu USN |
USN-3944-1 | wpa_supplicant and hostapd vulnerabilities |
References
History
No history.
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Freebsd
Subscribe
Freebsd
Subscribe
Opensuse
Subscribe
Backports Sle
Subscribe
Leap
Subscribe
Synology
Subscribe
Radius Server
Subscribe
Router Manager
Subscribe
W1.fi
Subscribe
Hostapd
Subscribe
Wpa Supplicant
Subscribe
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-04T21:54:44.081Z
Reserved: 2019-03-01T00:00:00.000Z
Link: CVE-2019-9498
No data.
Status : Modified
Published: 2019-04-17T14:29:04.010
Modified: 2024-11-21T04:51:44.190
Link: CVE-2019-9498
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN