First published: Wed Aug 08 2018(Updated: )
An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
W1.fi Wpa Supplicant | >=2.0<=2.6 | |
ubuntu/wpa | <2:2.6-15ubuntu2.1 | 2:2.6-15ubuntu2.1 |
ubuntu/wpa | <2.1-0ubuntu1.6 | 2.1-0ubuntu1.6 |
ubuntu/wpa | <2.4-0ubuntu6.3 | 2.4-0ubuntu6.3 |
debian/wpa | 2:2.9.0-21+deb11u1 2:2.9.0-21+deb11u2 2:2.10-12+deb12u1 2:2.10-12+deb12u2 2:2.10-21.1 2:2.10-22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14526 is a vulnerability discovered in wpa_supplicant versions 2.0 through 2.6.
The severity of CVE-2018-14526 is medium, with a CVSS score of 6.5.
CVE-2018-14526 allows an attacker within range of the Access Point and client to abuse the vulnerability and recover sensitive information by exploiting a decryption oracle.
Yes, a fix is available. For Ubuntu, the affected versions are 2.1-0ubuntu1.6, 2.4-0ubuntu6.3, and 2:2.6-15ubuntu2.1. For Debian, the affected versions are 2:2.7+git20190128+0c1e29f-6+deb10u3, 2:2.9.0-21, 2:2.10-12, and 2:2.10-15.
You can find more information about CVE-2018-14526 at the following references: http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00013.html, http://www.securitytracker.com/id/1041438, and https://access.redhat.com/errata/RHSA-2018:3107.