Total vulnerabilities in the database
The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.
Software | From | Fixed in |
---|---|---|
w1.fi / hostapd | 2.0 | 2.8.x |
fedoraproject / fedora | 30 | 30.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 19.04 | 19.04.x |
debian / debian_linux | 10.0 | 10.0.x |