Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-14526

Опубликовано: 08 авг. 2018
Источник: redhat
CVSS3: 8.3
EPSS Низкий

Описание

An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.

Отчет

Red Hat Virtualization images include wpa_supplicant as a component from the base Red Hat Enterprise Linux operating system, but use of Red Hat Virtualization on a wireless network is neither recommended nor supported. A future update may address this issue. This issue affects the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wpa_supplicantWill not fix
Red Hat Enterprise Linux 6wpa_supplicantWill not fix
Red Hat Enterprise Linux 8wpa_supplicantNot affected
Red Hat Virtualization 4wpa_supplicantWill not fix
Red Hat Enterprise Linux 7wpa_supplicantFixedRHSA-2018:310730.10.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1614520wpa_supplicant: Unauthenticated EAPOL-Key decryption in wpa_supplicant

EPSS

Процентиль: 78%
0.01138
Низкий

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 7 лет назад

An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.

CVSS3: 6.5
nvd
больше 7 лет назад

An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.

CVSS3: 6.5
debian
больше 7 лет назад

An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 throug ...

suse-cvrf
больше 6 лет назад

Security update for wpa_supplicant

suse-cvrf
около 7 лет назад

Security update for wpa_supplicant

EPSS

Процентиль: 78%
0.01138
Низкий

8.3 High

CVSS3