Lucene search

K

CVE-2019-9495 The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns

🗓️ 17 Apr 2019 13:08:31Reported by certccType 
cvelist
 cvelist
🔗 www.cve.org👁 14 Views

The EAP-PWD implementation in hostapd and wpa_supplicant is vulnerable to side-channel attacks due to cache access pattern

Show more
Related
Affected
Refs
ReporterTitlePublishedViews
Family
OSV
CVE-2019-9495
17 Apr 201914:29
osv
OSV
CVE-2019-9494
17 Apr 201914:29
osv
OSV
CVE-2022-23304
17 Jan 202202:15
osv
OSV
CVE-2022-23303
17 Jan 202202:15
osv
OSV
CVE-2019-13456
3 Dec 201920:15
osv
OSV
wpa - security update
10 Apr 201900:00
osv
OSV
hostapd-2.9-6.2 on GA media
15 Jun 202400:00
osv
OSV
wpa - security update
31 Jul 201900:00
osv
OSV
wpa_supplicant-2.9-13.4 on GA media
15 Jun 202400:00
osv
CVE
CVE-2019-9495
17 Apr 201914:29
cve
Rows per page
[
  {
    "product": "hostapd with EAP-pwd support",
    "vendor": "Wi-Fi Alliance",
    "versions": [
      {
        "lessThanOrEqual": "2.7",
        "status": "affected",
        "version": "2.7",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "wpa_supplicant with EAP-pwd support",
    "vendor": "Wi-Fi Alliance",
    "versions": [
      {
        "lessThanOrEqual": "2.7",
        "status": "affected",
        "version": "2.7",
        "versionType": "custom"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo