296,720
Total vulnerabilities in the database
The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.
| Software | From | Fixed in |
|---|---|---|
| w1.fi / hostapd | 2.0 | 2.8.x |
| fedoraproject / fedora | 30 | 30.x |
| canonical / ubuntu_linux | 18.04 | 18.04.x |
| canonical / ubuntu_linux | 19.04 | 19.04.x |
| debian / debian_linux | 10.0 | 10.0.x |