Vulnerability in EAP-PWD implementation in hostapd and wpa_supplicant
Reporter | Title | Published | Views | Family All 145 |
---|---|---|---|---|
![]() | Default configuration | 17 Apr 201914:29 | – | prion |
![]() | Design/Logic Flaw | 17 Apr 201914:29 | – | prion |
![]() | Default configuration | 17 Jan 202202:15 | – | prion |
![]() | Default credentials | 3 Dec 201920:15 | – | prion |
![]() | Default configuration | 17 Jan 202202:15 | – | prion |
![]() | FreeBSD -- EAP-pwd side-channel attack | 10 Apr 201900:00 | – | freebsd |
![]() | FreeBSD -- SAE side-channel attacks | 10 Apr 201900:00 | – | freebsd |
![]() | CVE-2019-9495 The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns | 17 Apr 201913:31 | – | cvelist |
![]() | CVE-2019-9494 The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side-channel attacks | 17 Apr 201913:31 | – | cvelist |
![]() | CVE-2022-23304 | 17 Jan 202200:00 | – | cvelist |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Alpine | edge-main | noarch | wpa_supplicant | 2.7-r2 | UNKNOWN |
Alpine | 3.10-main | noarch | wpa_supplicant | 2.7-r2 | UNKNOWN |
Alpine | 3.11-main | noarch | wpa_supplicant | 2.7-r2 | UNKNOWN |
Alpine | 3.12-main | noarch | wpa_supplicant | 2.7-r2 | UNKNOWN |
Alpine | 3.13-main | noarch | wpa_supplicant | 2.7-r2 | UNKNOWN |
Alpine | 3.14-main | noarch | wpa_supplicant | 2.7-r2 | UNKNOWN |
Alpine | 3.15-main | noarch | wpa_supplicant | 2.7-r2 | UNKNOWN |
Alpine | 3.16-main | noarch | wpa_supplicant | 2.7-r2 | UNKNOWN |
Alpine | 3.17-main | noarch | wpa_supplicant | 2.7-r2 | UNKNOWN |
Alpine | 3.18-main | noarch | wpa_supplicant | 2.7-r2 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo