Vulnerability Database

289,599

Total vulnerabilities in the database

CVE-2019-9495

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

  • Published: Apr 17, 2019
  • Updated: Apr 13, 2023
  • CVE: CVE-2019-9495
  • Severity: Low
  • Exploit:

CVSS v3:

  • Severity: Low
  • Score: 3.7
  • AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v2:

  • Severity: Low
  • Score: 4.3
  • AV:N/AC:M/Au:N/C:P/I:N/A:N

CWEs:

Software From Fixed in
w1.fi / hostapd - 2.7.x
w1.fi / wpa_supplicant - 2.7.x
fedoraproject / fedora 28 28.x
fedoraproject / fedora 29 29.x
fedoraproject / fedora 30 30.x
opensuse / leap 15.1 15.1.x
opensuse / backports_sle 15.0-sp1 15.0-sp1.x
opensuse / backports_sle 15.0 15.0.x
debian / debian_linux 8.0 8.0.x
synology / radius_server 3.0 3.0.x
synology / router_manager - 1.2.3-8017
freebsd / freebsd 11.2-p3 11.2-p3.x
freebsd / freebsd 11.2-p4 11.2-p4.x
freebsd / freebsd 11.2-p5 11.2-p5.x
freebsd / freebsd 12.0-p1 12.0-p1.x
freebsd / freebsd 11.2-p7 11.2-p7.x
freebsd / freebsd 12.0 12.0.x
freebsd / freebsd 11.2 11.2.x
freebsd / freebsd 11.2-p2 11.2-p2.x
freebsd / freebsd 11.2-p6 11.2-p6.x
freebsd / freebsd 11.2-p9 11.2-p9.x
freebsd / freebsd 12.0-p3 12.0-p3.x
freebsd / freebsd 11.2-rc3 11.2-rc3.x
freebsd / freebsd 12.0-p2 12.0-p2.x
freebsd / freebsd 11.2-p8 11.2-p8.x