Lucene search

K

Hostapd With Eap-pwd Support Security Vulnerabilities

cve
cve

CVE-2019-9498

The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication,...

8.1CVSS

7.8AI Score

0.007EPSS

2019-04-17 02:29 PM
191
cve
cve

CVE-2019-9499

The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection.....

8.1CVSS

7.8AI Score

0.007EPSS

2019-04-17 02:29 PM
215
cve
cve

CVE-2019-9497

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not...

8.1CVSS

7.9AI Score

0.016EPSS

2019-04-17 02:29 PM
187
cve
cve

CVE-2019-9495

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful...

3.7CVSS

6.4AI Score

0.01EPSS

2019-04-17 02:29 PM
191