Total vulnerabilities in the database
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
Software | From | Fixed in |
---|---|---|
w1.fi / hostapd | - | 2.7.x |
w1.fi / wpa_supplicant | - | 2.7.x |
fedoraproject / fedora | 28 | 28.x |
fedoraproject / fedora | 29 | 29.x |
fedoraproject / fedora | 30 | 30.x |
opensuse / leap | 15.1 | 15.1.x |
opensuse / backports_sle | 15.0-sp1 | 15.0-sp1.x |
opensuse / backports_sle | 15.0 | 15.0.x |
synology / radius_server | 3.0 | 3.0.x |
synology / router_manager | - | 1.2.3-8087 |
freebsd / freebsd | 11.2-p3 | 11.2-p3.x |
freebsd / freebsd | 11.2-p4 | 11.2-p4.x |
freebsd / freebsd | 11.2-p5 | 11.2-p5.x |
freebsd / freebsd | 12.0-p1 | 12.0-p1.x |
freebsd / freebsd | 11.2-p7 | 11.2-p7.x |
freebsd / freebsd | 12.0 | 12.0.x |
freebsd / freebsd | 11.2 | 11.2.x |
freebsd / freebsd | 11.2-p2 | 11.2-p2.x |
freebsd / freebsd | 11.2-p6 | 11.2-p6.x |
freebsd / freebsd | 11.2-p9 | 11.2-p9.x |
freebsd / freebsd | 12.0-p3 | 12.0-p3.x |
freebsd / freebsd | 11.2-rc3 | 11.2-rc3.x |
freebsd / freebsd | 12.0-p2 | 12.0-p2.x |
freebsd / freebsd | 11.2-p8 | 11.2-p8.x |