First published: Thu Sep 12 2019(Updated: )
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. An attacker in radio range of the access point could inject a specially constructed unauthenticated IEEE 802.11 frame to the access point to cause associated stations to be disconnected and require a reconnection to the network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | <=2:2.9-1<=2:2.4-1+deb9u4<=2:2.4-1<=2:2.7+git20190128+0c1e29f-6 | 2:2.9-2 2:2.7+git20190128+0c1e29f-6+deb10u1 |
ubuntu/wpa | <2:2.6-15ubuntu2.5 | 2:2.6-15ubuntu2.5 |
ubuntu/wpa | <2:2.6-21ubuntu3.3 | 2:2.6-21ubuntu3.3 |
ubuntu/wpa | <2.1-0ubuntu1.7+ | 2.1-0ubuntu1.7+ |
ubuntu/wpa | <2.4-0ubuntu6.6 | 2.4-0ubuntu6.6 |
debian/wpa | 2:2.9.0-21+deb11u2 2:2.10-12+deb12u2 2:2.10-22 | |
w1.fi hostapd | <=2.9 | |
wpa supplicant | <=2.9 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =10.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16275 is a vulnerability that allows an incorrect indication of disconnection in hostapd and wpa_supplicant due to mishandled source address validation, leading to a denial of service.
CVE-2019-16275 has a severity value of 6.5, which is considered medium.
hostapd versions before 2.10 and wpa_supplicant versions before 2.10 are affected by CVE-2019-16275.
To fix CVE-2019-16275, update hostapd to version 2.10 or later, and update wpa_supplicant to version 2.10 or later.
You can find more information about CVE-2019-16275 on the following references: [1] [2] [3].