CVE-2019-9497
Summary
| CVE | CVE-2019-9497 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-04-17 14:29:00 UTC |
| Updated | 2023-11-07 03:13:00 UTC |
| Description | The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 28 Update: hostapd-2.7-2.fc28 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [SECURITY] Fedora 29 Update: hostapd-2.7-2.fc29 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [security-announce] openSUSE-SU-2020:0222-1: moderate: Security update f |
SUSE |
lists.opensuse.org |
|
| Synology Inc. |
CONFIRM |
www.synology.com |
|
| [SECURITY] Fedora 30 Update: hostapd-2.7-2.fc30 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Mailing List, Release Notes, Third Party Advisory |
| [SECURITY] [DLA 1867-1] wpa security update |
MLIST |
lists.debian.org |
|
| [SECURITY] Fedora 29 Update: hostapd-2.7-2.fc29 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Mailing List, Release Notes, Third Party Advisory |
| [SECURITY] Fedora 30 Update: hostapd-2.7-2.fc30 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| Index of /security/2019-4 |
CONFIRM |
w1.fi |
Patch, Vendor Advisory |
| Bugtraq: FreeBSD Security Advisory FreeBSD-SA-19:03.wpa |
BUGTRAQ |
seclists.org |
|
| FreeBSD-SA-19:03 |
FREEBSD |
security.FreeBSD.org |
|
| FreeBSD Security Advisory - FreeBSD-SA-19:03.wpa ≈ Packet Storm |
MISC |
packetstormsecurity.com |
|
| [SECURITY] Fedora 28 Update: hostapd-2.7-2.fc28 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Mailing List, Release Notes, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 500741 Alpine Linux Security Update for wpa_supplicant
- 504517 Alpine Linux Security Update for wpa_supplicant
- 750549 OpenSUSE Security Update for wpa_supplicant (openSUSE-SU-2020:2059-1)
- 750557 OpenSUSE Security Update for wpa_supplicant (openSUSE-SU-2020:2053-1)
- 752179 SUSE Enterprise Linux Security Update for wpa_supplicant (SUSE-SU-2022:1853-1)