CVE-2019-9496
17.04.2019, 14:29
An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.Enginsight
Vendor | Product | Version |
---|---|---|
w1.fi | hostapd | 𝑥 ≤ 2.7 |
w1.fi | wpa_supplicant | 𝑥 ≤ 2.7 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-642 - External Control of Critical State DataThe software stores security-critical state information about its users, or the software itself, in a location that is accessible to unauthorized actors.
- CWE-287 - Improper AuthenticationWhen an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
References