Логотип exploitDog
bind:"CVE-2019-9495"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-9495"

Количество 12

Количество 12

ubuntu логотип

CVE-2019-9495

почти 7 лет назад

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2019-9495

почти 7 лет назад

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2019-9495

почти 7 лет назад

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2019-9495

почти 7 лет назад

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulne ...

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-p694-q9qw-q238

больше 3 лет назад

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 3.7
EPSS: Низкий
fstec логотип

BDU:2019-01946

почти 7 лет назад

Уязвимость реализации протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с использованием криптографических алгоритмов, содержащих дефекты, позволяющая нарушителю осуществить установку и запуск приложений или получить доступ к конфиденциальным данным

CVSS3: 3.7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0222-1

почти 6 лет назад

Security update for hostapd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3424-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1853-1

больше 3 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2059-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2053-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3380-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-9495

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 3.7
4%
Низкий
почти 7 лет назад
redhat логотип
CVE-2019-9495

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 7
4%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-9495

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 3.7
4%
Низкий
почти 7 лет назад
debian логотип
CVE-2019-9495

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulne ...

CVSS3: 3.7
4%
Низкий
почти 7 лет назад
github логотип
GHSA-p694-q9qw-q238

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 3.7
4%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-01946

Уязвимость реализации протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с использованием криптографических алгоритмов, содержащих дефекты, позволяющая нарушителю осуществить установку и запуск приложений или получить доступ к конфиденциальным данным

CVSS3: 3.7
4%
Низкий
почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0222-1

Security update for hostapd

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:3424-1

Security update for wpa_supplicant

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2022:1853-1

Security update for wpa_supplicant

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2059-1

Security update for wpa_supplicant

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2053-1

Security update for wpa_supplicant

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3380-1

Security update for wpa_supplicant

около 5 лет назад

Уязвимостей на страницу