First published: Wed Apr 10 2019(Updated: )
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
W1.fi Hostapd | <=2.4 | |
W1.fi Hostapd | >=2.5<=2.7 | |
W1.fi Wpa Supplicant | <=2.4 | |
W1.fi Wpa Supplicant | >=2.5<=2.7 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
openSUSE Backports SLE | =15.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =8.0 | |
Synology Radius Server | =3.0 | |
Synology Router Manager | =1.2 | |
FreeBSD FreeBSD | >=11.0<=11.1 | |
FreeBSD FreeBSD | =11.2 | |
FreeBSD FreeBSD | =11.2-p13 | |
FreeBSD FreeBSD | =11.2-p2 | |
FreeBSD FreeBSD | =11.2-p3 | |
FreeBSD FreeBSD | =11.2-p4 | |
FreeBSD FreeBSD | =11.2-p5 | |
FreeBSD FreeBSD | =11.2-p6 | |
FreeBSD FreeBSD | =11.2-p7 | |
FreeBSD FreeBSD | =11.2-p8 | |
FreeBSD FreeBSD | =11.2-p9 | |
FreeBSD FreeBSD | =12.0 | |
FreeBSD FreeBSD | =12.0-p1 | |
FreeBSD FreeBSD | =12.0-p2 | |
FreeBSD FreeBSD | =12.0-p3 | |
ubuntu/wpa | <2:2.6-15ubuntu2.2 | 2:2.6-15ubuntu2.2 |
ubuntu/wpa | <2:2.6-18ubuntu1.1 | 2:2.6-18ubuntu1.1 |
ubuntu/wpa | <2:2.6-21ubuntu3 | 2:2.6-21ubuntu3 |
ubuntu/wpa | <2.1-0ubuntu1.7 | 2.1-0ubuntu1.7 |
ubuntu/wpa | <2.8 | 2.8 |
ubuntu/wpa | <2.4-0ubuntu6.4 | 2.4-0ubuntu6.4 |
debian/wpa | 2:2.9.0-21+deb11u1 2:2.9.0-21+deb11u2 2:2.10-12+deb12u1 2:2.10-12+deb12u2 2:2.10-21.1 2:2.10-22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-9499 is high.
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a malicious peer.
The software affected by CVE-2019-9499 includes wpa_supplicant versions 2:2.7+git20190128+0c1e29f-6+deb10u3, 2:2.9.0-21, 2:2.10-12, and 2:2.10-15.
To fix CVE-2019-9499, update wpa_supplicant to version 2.8 or later.
Yes, you can find more information about CVE-2019-9499 at the following references: [1](https://seclists.org/bugtraq/2019/May/40) [2](https://w1.fi/security/2019-4/) [3](https://www.synology.com/security/advisory/Synology_SA_19_16)