CVE-2019-9498
Published Apr 17, 2019
Last updated a year ago
Overview
- Description
- The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
- Source
- cret@cert.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.9
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "552340BD-4450-4767-BDB3-44FF526BD4ED", "versionEndIncluding": "2.4" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A9FD3E6-61E9-4F50-8077-DDC07F2CC46D", "versionEndIncluding": "2.7", "versionStartIncluding": "2.5" }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "068DF041-070A-4483-98A7-3FA2E245344F", "versionEndIncluding": "2.4" }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "922FB3CB-715B-425D-A5DA-E6A50E6D174F", "versionEndIncluding": "2.7", "versionStartIncluding": "2.5" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D83DA865-E4A6-4FBF-AA1B-A969EBA6B2AD" }, { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568" }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:synology:radius_server:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C6E6871-7BB3-43BB-9A31-0B44B46C8D97" }, { "criteria": "cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85F6D2BF-23EA-4D44-8126-64EA85184D38" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A89C04C1-3DAF-4490-9045-7E18323B04E4", "versionEndIncluding": "11.1", "versionStartIncluding": "11.0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3ACD1D8D-B3BC-4E99-B846-90A4071DB87B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:p13:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34134EDA-127A-48E2-B630-94DEF14666A9" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "699FE432-8DF0-49F1-A98B-0E19CE01E5CE" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20B06752-39EE-4600-AC1F-69FB9C88E2A8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22365F7C-2B00-4B61-84E8-EFBA3B8CFDC0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E86CD544-86C4-4D9D-9CE5-087027509EDA" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:p6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64E47AE7-BB45-428E-90E9-38BFDFF23650" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:p7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "586B9FA3-65A2-41EB-A848-E4A75565F0CA" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:p8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1164B48E-2F28-43C5-9B7B-546EAE12E27D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:p9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0B15B89-3AD2-4E03-9F47-DA934702187B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "826B53C2-517F-4FC6-92E8-E7FCB24F91B4" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93F10A46-AEF2-4FDD-92D6-0CF07B70F986" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1AD57A9-F53A-4E40-966E-F2F50852C5E4" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4029113-130F-4A33-A8A0-BC3E74000378" } ], "operator": "OR" } ] } ]