6.5 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.9 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:M/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
53.5%
In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd
handshakes fails because the password element cannot be found within 10
iterations of the hunting and pecking loop. This leaks information that an
attacker can use to recover the password of any user. This information
leakage is similar to the “Dragonblood” attack and CVE-2019-9494.
bugzilla.redhat.com/show_bug.cgi?id=1737663
github.com/FreeRADIUS/freeradius-server/commit/85497b5ff37ccb656895b826b88585898c209586 (3.0.x)
github.com/FreeRADIUS/freeradius-server/commit/a99746c93b8b3ae3be367af0e46f0d6a9626f566 (master)
launchpad.net/bugs/cve/CVE-2019-13456
nvd.nist.gov/vuln/detail/CVE-2019-13456
security-tracker.debian.org/tracker/CVE-2019-13456
wpa3.mathyvanhoef.com/#new
www.cve.org/CVERecord?id=CVE-2019-13456
6.5 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.9 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:M/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
53.5%