Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-24912

Опубликовано: 12 мар. 2025
Источник: redhat
CVSS3: 3.7
EPSS Низкий

Описание

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

A flaw was found in hostapd. This vulnerability can allow an attacker to force RADIUS authentications to fail via crafted RADIUS packets injected between hostapd and the RADIUS server.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10hostapdFix deferred
Red Hat Enterprise Linux 8hostapdFix deferred
Red Hat Enterprise Linux 9hostapdFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-826
https://bugzilla.redhat.com/show_bug.cgi?id=2351487hostapd: RADIUS Packet Processing Flaw in hostapd

EPSS

Процентиль: 38%
0.00164
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
ubuntu
6 месяцев назад

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

CVSS3: 3.7
nvd
6 месяцев назад

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

CVSS3: 3.7
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 3.7
debian
6 месяцев назад

hostapd fails to process crafted RADIUS packets properly. When hostapd ...

suse-cvrf
5 месяцев назад

Security update for wpa_supplicant

EPSS

Процентиль: 38%
0.00164
Низкий

3.7 Low

CVSS3