CVE-2019-9495
17.04.2019, 14:29
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.Enginsight
Vendor | Product | Version |
---|---|---|
w1.fi | hostapd | 𝑥 ≤ 2.7 |
w1.fi | wpa_supplicant | 𝑥 ≤ 2.7 |
opensuse | backports_sle | 15.0 |
opensuse | backports_sle | 15.0:sp1 |
opensuse | leap | 15.1 |
synology | radius_server | 3.0 |
synology | router_manager | 𝑥 < 1.2.3-8017 |
debian | debian_linux | 8.0 |
freebsd | freebsd | 11.2 |
freebsd | freebsd | 11.2:p2 |
freebsd | freebsd | 11.2:p3 |
freebsd | freebsd | 11.2:p4 |
freebsd | freebsd | 11.2:p5 |
freebsd | freebsd | 11.2:p6 |
freebsd | freebsd | 11.2:p7 |
freebsd | freebsd | 11.2:p8 |
freebsd | freebsd | 11.2:p9 |
freebsd | freebsd | 11.2:rc3 |
freebsd | freebsd | 12.0 |
freebsd | freebsd | 12.0:p1 |
freebsd | freebsd | 12.0:p2 |
freebsd | freebsd | 12.0:p3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-524 - Use of Cache Containing Sensitive InformationThe code uses a cache that contains sensitive information, but the cache can be read by an actor outside of the intended control sphere.
- CWE-203 - Observable DiscrepancyThe product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
References