First published: Wed Apr 10 2019(Updated: )
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
Credit: cret@cert.org cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
W1.fi Hostapd | <=2.7 | |
W1.fi Wpa Supplicant | <=2.7 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
openSUSE Backports SLE | =15.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 | |
Synology Radius Server | =3.0 | |
Synology Router Manager | <1.2.3-8017 | |
Debian Debian Linux | =8.0 | |
FreeBSD FreeBSD | =11.2 | |
FreeBSD FreeBSD | =11.2-p2 | |
FreeBSD FreeBSD | =11.2-p3 | |
FreeBSD FreeBSD | =11.2-p4 | |
FreeBSD FreeBSD | =11.2-p5 | |
FreeBSD FreeBSD | =11.2-p6 | |
FreeBSD FreeBSD | =11.2-p7 | |
FreeBSD FreeBSD | =11.2-p8 | |
FreeBSD FreeBSD | =11.2-p9 | |
FreeBSD FreeBSD | =11.2-rc3 | |
FreeBSD FreeBSD | =12.0 | |
FreeBSD FreeBSD | =12.0-p1 | |
FreeBSD FreeBSD | =12.0-p2 | |
FreeBSD FreeBSD | =12.0-p3 | |
ubuntu/wpa | <2:2.6-15ubuntu2.2 | 2:2.6-15ubuntu2.2 |
ubuntu/wpa | <2:2.6-18ubuntu1.1 | 2:2.6-18ubuntu1.1 |
ubuntu/wpa | <2:2.6-21ubuntu3 | 2:2.6-21ubuntu3 |
ubuntu/wpa | <2.1-0ubuntu1.7 | 2.1-0ubuntu1.7 |
ubuntu/wpa | <2.8 | 2.8 |
ubuntu/wpa | <2.4-0ubuntu6.4 | 2.4-0ubuntu6.4 |
debian/wpa | 2:2.9.0-21+deb11u1 2:2.9.0-21+deb11u2 2:2.10-12+deb12u1 2:2.10-12+deb12u2 2:2.10-21.1 2:2.10-22 | |
<=2.7 | ||
<=2.7 | ||
=28 | ||
=29 | ||
=30 | ||
=15.0 | ||
=15.0-sp1 | ||
=15.1 | ||
=3.0 | ||
<1.2.3-8017 | ||
=8.0 | ||
=11.2 | ||
=11.2-p2 | ||
=11.2-p3 | ||
=11.2-p4 | ||
=11.2-p5 | ||
=11.2-p6 | ||
=11.2-p7 | ||
=11.2-p8 | ||
=11.2-p9 | ||
=11.2-rc3 | ||
=12.0 | ||
=12.0-p1 | ||
=12.0-p2 | ||
=12.0-p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-9495.
The severity of CVE-2019-9495 is medium with a CVSS score of 3.7.
All versions of hostapd and wpa_supplicant with EAP-PWD support are affected by CVE-2019-9495.
To fix CVE-2019-9495, update hostapd and wpa_supplicant to version 2.8 or later.
You can find more information about CVE-2019-9495 in the following references: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html), [Reference 2](http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html), [Reference 3](https://lists.debian.org/debian-lts-announce/2019/07/msg00030.html)