Total vulnerabilities in the database
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
Software | From | Fixed in |
---|---|---|
w1.fi / hostapd | - | 2.4.x |
w1.fi / wpa_supplicant | - | 2.4.x |
w1.fi / wpa_supplicant | 2.5 | 2.7.x |
w1.fi / hostapd | 2.5 | 2.7.x |
fedoraproject / fedora | 28 | 28.x |
fedoraproject / fedora | 29 | 29.x |
fedoraproject / fedora | 30 | 30.x |
opensuse / leap | 15.1 | 15.1.x |
opensuse / backports_sle | 15.0-sp1 | 15.0-sp1.x |
opensuse / backports_sle | 15.0 | 15.0.x |
debian / debian_linux | 8.0 | 8.0.x |
synology / router_manager | 1.2 | 1.2.x |
synology / radius_server | 3.0 | 3.0.x |
freebsd / freebsd | 11.2-p3 | 11.2-p3.x |
freebsd / freebsd | 11.2-p4 | 11.2-p4.x |
freebsd / freebsd | 11.2-p5 | 11.2-p5.x |
freebsd / freebsd | 12.0-p1 | 12.0-p1.x |
freebsd / freebsd | 11.2-p7 | 11.2-p7.x |
freebsd / freebsd | 12.0 | 12.0.x |
freebsd / freebsd | 11.2 | 11.2.x |
freebsd / freebsd | 11.2-p2 | 11.2-p2.x |
freebsd / freebsd | 11.2-p6 | 11.2-p6.x |
freebsd / freebsd | 11.2-p9 | 11.2-p9.x |
freebsd / freebsd | 12.0-p3 | 12.0-p3.x |
freebsd / freebsd | 12.0-p2 | 12.0-p2.x |
freebsd / freebsd | 11.2-p13 | 11.2-p13.x |
freebsd / freebsd | 11.2-p8 | 11.2-p8.x |
freebsd / freebsd | 11.0 | 11.1.x |