Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-23304

Опубликовано: 17 янв. 2022
Источник: nvd
CVSS3: 9.8
CVSS2: 6.8
EPSS Низкий

Описание

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*
Версия до 2.10 (исключая)
cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*
Версия до 2.10 (исключая)
Конфигурация 2
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

EPSS

Процентиль: 18%
0.00056
Низкий

9.8 Critical

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-203

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 4 лет назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

CVSS3: 7
redhat
около 4 лет назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

CVSS3: 9.8
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 9.8
debian
около 4 лет назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplica ...

CVSS3: 9.8
github
почти 4 года назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

EPSS

Процентиль: 18%
0.00056
Низкий

9.8 Critical

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-203