Total vulnerabilities in the database
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
Software | From | Fixed in |
---|---|---|
w1.fi / hostapd | - | 2.7.x |
w1.fi / wpa_supplicant | - | 2.7.x |
fedoraproject / fedora | 28 | 28.x |
fedoraproject / fedora | 29 | 29.x |
fedoraproject / fedora | 30 | 30.x |
opensuse / leap | 15.1 | 15.1.x |
opensuse / backports_sle | 15.0-sp1 | 15.0-sp1.x |
opensuse / backports_sle | 15.0 | 15.0.x |
debian / debian_linux | 8.0 | 8.0.x |
synology / radius_server | 3.0 | 3.0.x |
synology / router_manager | - | 1.2.3-8017 |
freebsd / freebsd | 11.2-p3 | 11.2-p3.x |
freebsd / freebsd | 11.2-p4 | 11.2-p4.x |
freebsd / freebsd | 11.2-p5 | 11.2-p5.x |
freebsd / freebsd | 12.0-p1 | 12.0-p1.x |
freebsd / freebsd | 11.2-p7 | 11.2-p7.x |
freebsd / freebsd | 12.0 | 12.0.x |
freebsd / freebsd | 11.2 | 11.2.x |
freebsd / freebsd | 11.2-p2 | 11.2-p2.x |
freebsd / freebsd | 11.2-p6 | 11.2-p6.x |
freebsd / freebsd | 11.2-p9 | 11.2-p9.x |
freebsd / freebsd | 12.0-p3 | 12.0-p3.x |
freebsd / freebsd | 11.2-rc3 | 11.2-rc3.x |
freebsd / freebsd | 12.0-p2 | 12.0-p2.x |
freebsd / freebsd | 11.2-p8 | 11.2-p8.x |