CVE-2019-9497
Publication date 10 April 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
Status
Package | Ubuntu Release | Status |
---|---|---|
wpa | ||
18.04 LTS bionic |
Fixed 2:2.6-15ubuntu2.2
|
|
16.04 LTS xenial |
Fixed 2.4-0ubuntu6.4
|
|
14.04 LTS trusty |
Fixed 2.1-0ubuntu1.7
|
|
wpasupplicant | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3944-1
- wpa_supplicant and hostapd vulnerabilities
- 10 April 2019