Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-24912

Опубликовано: 12 мар. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 3.7

Описание

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

РелизСтатусПримечание
devel

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
noble

not-affected

code not present
oracular

not-affected

code not present
upstream

needs-triage

Показывать по

EPSS

Процентиль: 32%
0.0012
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
redhat
6 месяцев назад

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

CVSS3: 3.7
nvd
6 месяцев назад

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

CVSS3: 3.7
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 3.7
debian
6 месяцев назад

hostapd fails to process crafted RADIUS packets properly. When hostapd ...

suse-cvrf
5 месяцев назад

Security update for wpa_supplicant

EPSS

Процентиль: 32%
0.0012
Низкий

3.7 Low

CVSS3