The EAP-PWD implementation in hostapd and wpa_supplicant is vulnerable to side-channel attacks due to cache access pattern
Reporter | Title | Published | Views | Family All 134 |
---|---|---|---|---|
OSV | CVE-2019-9495 | 17 Apr 201914:29 | – | osv |
OSV | CVE-2019-9494 | 17 Apr 201914:29 | – | osv |
OSV | CVE-2022-23304 | 17 Jan 202202:15 | – | osv |
OSV | CVE-2022-23303 | 17 Jan 202202:15 | – | osv |
OSV | CVE-2019-13456 | 3 Dec 201920:15 | – | osv |
OSV | wpa - security update | 10 Apr 201900:00 | – | osv |
OSV | hostapd-2.9-6.2 on GA media | 15 Jun 202400:00 | – | osv |
OSV | wpa - security update | 31 Jul 201900:00 | – | osv |
OSV | wpa_supplicant-2.9-13.4 on GA media | 15 Jun 202400:00 | – | osv |
CVE | CVE-2019-9495 | 17 Apr 201914:29 | – | cve |
[
{
"product": "hostapd with EAP-pwd support",
"vendor": "Wi-Fi Alliance",
"versions": [
{
"lessThanOrEqual": "2.7",
"status": "affected",
"version": "2.7",
"versionType": "custom"
}
]
},
{
"product": "wpa_supplicant with EAP-pwd support",
"vendor": "Wi-Fi Alliance",
"versions": [
{
"lessThanOrEqual": "2.7",
"status": "affected",
"version": "2.7",
"versionType": "custom"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo