CVE-2019-9499
17.04.2019, 14:29
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.Enginsight
Vendor | Product | Version |
---|---|---|
w1.fi | hostapd | 𝑥 ≤ 2.4 |
w1.fi | hostapd | 2.5 ≤ 𝑥 ≤ 2.7 |
w1.fi | wpa_supplicant | 𝑥 ≤ 2.4 |
w1.fi | wpa_supplicant | 2.5 ≤ 𝑥 ≤ 2.7 |
opensuse | backports_sle | 15.0 |
opensuse | backports_sle | 15.0:sp1 |
opensuse | leap | 15.1 |
debian | debian_linux | 8.0 |
synology | radius_server | 3.0 |
synology | router_manager | 1.2 |
freebsd | freebsd | 11.0 ≤ 𝑥 ≤ 11.1 |
freebsd | freebsd | 11.2 |
freebsd | freebsd | 11.2:p13 |
freebsd | freebsd | 11.2:p2 |
freebsd | freebsd | 11.2:p3 |
freebsd | freebsd | 11.2:p4 |
freebsd | freebsd | 11.2:p5 |
freebsd | freebsd | 11.2:p6 |
freebsd | freebsd | 11.2:p7 |
freebsd | freebsd | 11.2:p8 |
freebsd | freebsd | 11.2:p9 |
freebsd | freebsd | 12.0 |
freebsd | freebsd | 12.0:p1 |
freebsd | freebsd | 12.0:p2 |
freebsd | freebsd | 12.0:p3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References