Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-24912

Опубликовано: 12 мар. 2025
Источник: debian
EPSS Низкий

Описание

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wpanot-affectedpackage

Примечания

  • Introduced by: https://w1.fi/cgit/hostap/commit/?id=726432d7622cc0088ac353d073b59628b590ea44

  • Fixed by: https://w1.fi/cgit/hostap/commit/?id=339a334551ca911187cc870f4f97ef08e11db109

EPSS

Процентиль: 42%
0.00203
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 1 года назад

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

CVSS3: 3.7
redhat
около 1 года назад

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

CVSS3: 3.7
nvd
около 1 года назад

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

CVSS3: 3.7
msrc
12 месяцев назад

Описание отсутствует

suse-cvrf
около 1 года назад

Security update for wpa_supplicant

EPSS

Процентиль: 42%
0.00203
Низкий