First published: Wed Apr 17 2019(Updated: )
An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
W1.fi Hostapd | <=2.7 | |
W1.fi Wpa Supplicant | <=2.7 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9496 is a vulnerability that could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode.
The severity of CVE-2019-9496 is high with a CVSS score of 7.5.
All versions of hostapd with SAE support up to version 2.7 and all versions of W1.fi Wpa Supplicant up to version 2.7 are vulnerable. Also, Fedora versions 28, 29, and 30 are affected.
An attacker can force the hostapd process to terminate, potentially causing a denial-of-service condition.
Yes, you can find more information about CVE-2019-9496 at the following references: [1](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html), [2](http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html), [3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56OBBOJJSKRTDGEXZOVFSTP4HDSDBLAE/)