7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
70.2%
Package : wpa
Version : 2.3-1+deb8u7
CVE ID : CVE-2016-10743
It was found that the fallback mechanism for generating a WPS pin in
hostapd, an IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator,
used a low quality pseudorandom number generator. This was resolved by
using only the high quality os_get_random function.
For Debian 8 "Jessie", this problem has been fixed in version
2.3-1+deb8u7.
We recommend that you upgrade your wpa packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | amd64 | wpasupplicant-udeb | < 2.3-1+deb8u7 | wpasupplicant-udeb_2.3-1+deb8u7_amd64.deb |
Debian | 8 | amd64 | hostapd | < 1:2.3-1+deb8u7 | hostapd_1:2.3-1+deb8u7_amd64.deb |
Debian | 8 | armhf | hostapd | < 1:2.3-1+deb8u7 | hostapd_1:2.3-1+deb8u7_armhf.deb |
Debian | 8 | armel | hostapd | < 1:2.3-1+deb8u7 | hostapd_1:2.3-1+deb8u7_armel.deb |
Debian | 8 | armel | wpasupplicant | < 2.3-1+deb8u7 | wpasupplicant_2.3-1+deb8u7_armel.deb |
Debian | 8 | i386 | wpagui | < 2.3-1+deb8u7 | wpagui_2.3-1+deb8u7_i386.deb |
Debian | 8 | amd64 | wpasupplicant | < 2.3-1+deb8u7 | wpasupplicant_2.3-1+deb8u7_amd64.deb |
Debian | 8 | armhf | wpagui | < 2.3-1+deb8u7 | wpagui_2.3-1+deb8u7_armhf.deb |
Debian | 8 | amd64 | wpagui | < 2.3-1+deb8u7 | wpagui_2.3-1+deb8u7_amd64.deb |
Debian | 8 | i386 | wpasupplicant-udeb | < 2.3-1+deb8u7 | wpasupplicant-udeb_2.3-1+deb8u7_i386.deb |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
70.2%