First published: Sat Mar 23 2019(Updated: )
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
W1.fi Hostapd | <2.6 | |
ubuntu/wpa | <2.1-0ubuntu1.7 | 2.1-0ubuntu1.7 |
ubuntu/wpa | <2:2.6-7 | 2:2.6-7 |
ubuntu/wpa | <2.4-0ubuntu6.4 | 2.4-0ubuntu6.4 |
debian/wpa | 2:2.9.0-21+deb11u1 2:2.9.0-21+deb11u2 2:2.10-12+deb12u1 2:2.10-12+deb12u2 2:2.10-21.1 2:2.10-22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10743 is a vulnerability in hostapd before version 2.6 that allows the use of a low-quality PRNG.
CVE-2016-10743 has a severity score of 7.5, which is considered high.
hostapd versions before 2.6 are affected by CVE-2016-10743.
To fix CVE-2016-10743, update hostapd to version 2.6 or later.
You can find more information about CVE-2016-10743 on the MITRE, Ubuntu, and NVD websites.