CVE-2014-3686

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
w1.fihostapd
0.7.2
w1.fihostapd
1.0
w1.fihostapd
1.1
w1.fihostapd
2.0
w1.fihostapd
2.1
w1.fihostapd
2.2
w1.fiwpa_supplicant
0.72
w1.fiwpa_supplicant
1.0
w1.fiwpa_supplicant
1.1
w1.fiwpa_supplicant
2.0
w1.fiwpa_supplicant
2.1
w1.fiwpa_supplicant
2.2
canonicalubuntu_linux
10.04
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
debiandebian_linux
6.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wpa
bullseye (security)
2:2.9.0-21+deb11u2
fixed
bullseye
2:2.9.0-21+deb11u2
fixed
squeeze
not-affected
bookworm
2:2.10-12+deb12u2
fixed
bookworm (security)
2:2.10-12+deb12u2
fixed
sid
2:2.10-22
fixed
trixie
2:2.10-22
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
hostapd
zesty
dne
yakkety
dne
xenial
dne
wily
dne
vivid
dne
utopic
dne
trusty
dne
precise
ignored
lucid
ignored
wpa
zesty
Fixed 2.1-0ubuntu4
released
yakkety
Fixed 2.1-0ubuntu4
released
xenial
Fixed 2.1-0ubuntu4
released
wily
Fixed 2.1-0ubuntu4
released
vivid
Fixed 2.1-0ubuntu4
released
utopic
Fixed 2.1-0ubuntu4
released
trusty
Fixed 2.1-0ubuntu1.1
released
precise
dne
lucid
dne
wpasupplicant
zesty
dne
yakkety
dne
xenial
dne
wily
dne
vivid
dne
utopic
dne
trusty
dne
precise
Fixed 0.7.3-6ubuntu2.3
released
lucid
Fixed 0.6.9-3ubuntu3.2
released
References