Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-23304

Опубликовано: 17 янв. 2022
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. The highest threat from this vulnerability is to availability, confidentiality and integrity.

Отчет

Red Hat believes this vulnerability to be of moderate impact because one of the requisites for exploitation is the ability to run unprivileged code on the victim's machine; furthermore, the complexity of this attack is high, as it requires the ability to analyze cache access patterns and combine this with a sufficient number of handshake instances and an offline dictionary attack. It is important to note that this CVE was filed as the preceding CVE-2019-9495, which was intended to address several potential side channel attacks present in wpa_supplicant, was found to be a partial fix and did not address the cache-based attack mentioned in this CVE. In RHEL-8, the vulnerable configurations of wpa_supplicant and hostapd with SAE and EAP-pwd support (CONFIG_SAE=y and CONFIG_EAP_PWD=y, respectively) are not compiled. In RHEL-9, no vulnerable versions of wpa_supplicant are built (versions prior to 2.10), meaning that it is not susceptible to this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6wpa_supplicantOut of support scope
Red Hat Enterprise Linux 7wpa_supplicantNot affected
Red Hat Enterprise Linux 8wpa_supplicantNot affected
Red Hat Enterprise Linux 9wpa_supplicantNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-924
https://bugzilla.redhat.com/show_bug.cgi?id=2044599wpa_supplicant: EAP-pwd side-channel attacks as a result of cache access patterns

EPSS

Процентиль: 18%
0.00056
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 4 лет назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

CVSS3: 9.8
nvd
около 4 лет назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

CVSS3: 9.8
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 9.8
debian
около 4 лет назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplica ...

CVSS3: 9.8
github
почти 4 года назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

EPSS

Процентиль: 18%
0.00056
Низкий

7 High

CVSS3