CVE-2019-9499

The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

Published : 2019-04-17 14:29 Updated : 2019-05-15 22:29

6.8
CVSS Score More info
Score 6.8 / 10
6.8
Vendor Product Version URI
W1.fi Hostapd 2.4 cpe:/a:w1.fi:hostapd:2.4
W1.fi Hostapd 2.5 cpe:/a:w1.fi:hostapd:2.5
W1.fi Hostapd 2.6 cpe:/a:w1.fi:hostapd:2.6
W1.fi Hostapd 2.7 cpe:/a:w1.fi:hostapd:2.7
W1.fi Wpa Supplicant 2.4 cpe:/a:w1.fi:wpa_supplicant:2.4
W1.fi Wpa Supplicant 2.5 cpe:/a:w1.fi:wpa_supplicant:2.5
W1.fi Wpa Supplicant 2.6 cpe:/a:w1.fi:wpa_supplicant:2.6
W1.fi Wpa Supplicant 2.7 cpe:/a:w1.fi:wpa_supplicant:2.7
Fedoraproject Fedora 28 cpe:/o:fedoraproject:fedora:28
Fedoraproject Fedora 29 cpe:/o:fedoraproject:fedora:29
Fedoraproject Fedora 30 cpe:/o:fedoraproject:fedora:30
  1. W1.fi (2) Search CVE
    1. Hostapd (4) Search CVE
      1. 2.4
      2. 2.5
      3. 2.6
      4. 2.7
    2. Wpa Supplicant (4) Search CVE
      1. 2.4
      2. 2.5
      3. 2.6
      4. 2.7
  2. Fedoraproject (1) Search CVE
    1. Fedora (3) Search CVE
      1. 28
      2. 29
      3. 30

CWE

ID Name Description Links
CWE-264 Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. CVE

History of changes

Date Event
2019-05-15 22:29
2019-05-15 12:29
2019-05-15 02:29
2019-05-10 19:47
2019-04-28 00:29
2019-04-26 14:52
2019-04-23 22:29
2019-04-18 17:01
2019-04-17 14:29

New CVE