Логотип exploitDog
bind:CVE-2019-9497
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-9497

Количество 12

Количество 12

ubuntu логотип

CVE-2019-9497

почти 7 лет назад

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2019-9497

почти 7 лет назад

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2019-9497

почти 7 лет назад

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2019-9497

почти 7 лет назад

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplican ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-fvg7-p9r8-pcrj

больше 3 лет назад

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2019-01947

почти 7 лет назад

Уязвимость компонента wpa_supplicant протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с неправильной аутентификацией, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных, а также вызвать отказ в обслуживании

CVSS3: 8.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0222-1

почти 6 лет назад

Security update for hostapd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3424-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1853-1

больше 3 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2059-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2053-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3380-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-9497

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 8.1
8%
Низкий
почти 7 лет назад
redhat логотип
CVE-2019-9497

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 4.3
8%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-9497

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 8.1
8%
Низкий
почти 7 лет назад
debian логотип
CVE-2019-9497

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplican ...

CVSS3: 8.1
8%
Низкий
почти 7 лет назад
github логотип
GHSA-fvg7-p9r8-pcrj

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

CVSS3: 8.1
8%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-01947

Уязвимость компонента wpa_supplicant протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с неправильной аутентификацией, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных, а также вызвать отказ в обслуживании

CVSS3: 8.1
8%
Низкий
почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0222-1

Security update for hostapd

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:3424-1

Security update for wpa_supplicant

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2022:1853-1

Security update for wpa_supplicant

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2059-1

Security update for wpa_supplicant

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2053-1

Security update for wpa_supplicant

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3380-1

Security update for wpa_supplicant

около 5 лет назад

Уязвимостей на страницу