Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-9494
HistoryApr 10, 2019 - 12:00 a.m.

CVE-2019-9494

2019-04-1000:00:00
ubuntu.com
ubuntu.com
20
sae vulnerability
hostapd
wpa_supplicant
side channel attacks
timing differences
cache access patterns
password recovery
ubuntu

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.012

Percentile

85.5%

The implementations of SAE in hostapd and wpa_supplicant are vulnerable to
side channel attacks as a result of observable timing differences and cache
access patterns. An attacker may be able to gain leaked information from a
side channel attack that can be used for full password recovery. Both
hostapd with SAE support and wpa_supplicant with SAE support prior to and
including version 2.7 are affected.

Notes

Author Note
mdeslaur SAE support not built in Ubuntu

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.012

Percentile

85.5%