Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-24912

Опубликовано: 12 мар. 2025
Источник: debian

Описание

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wpanot-affectedpackage

Примечания

  • Introduced by: https://w1.fi/cgit/hostap/commit/?id=726432d7622cc0088ac353d073b59628b590ea44

  • Fixed by: https://w1.fi/cgit/hostap/commit/?id=339a334551ca911187cc870f4f97ef08e11db109

Связанные уязвимости

CVSS3: 3.7
ubuntu
6 месяцев назад

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

CVSS3: 3.7
redhat
6 месяцев назад

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

CVSS3: 3.7
nvd
6 месяцев назад

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

CVSS3: 3.7
msrc
5 месяцев назад

Описание отсутствует

suse-cvrf
5 месяцев назад

Security update for wpa_supplicant