First published: Fri Feb 26 2021(Updated: )
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
W1.fi Wpa Supplicant | >=1.0<2.10 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/wpa | 2:2.7+git20190128+0c1e29f-6+deb10u3 2:2.9.0-21 2:2.10-12 2:2.10-21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27803 is a vulnerability in how p2p/p2p_pd.c in wpa_supplicant before version 2.10 processes P2P provision discovery requests.
The severity of CVE-2021-27803 is high with a CVSS score of 7.5.
Users of wpa_supplicant versions before 2.10, W1.fi Wpa Supplicant, Fedora 32, Fedora 33, Fedora 34, Debian Linux 9.0, and Debian Linux 10.0 are affected by CVE-2021-27803.
CVE-2021-27803 can be exploited by an attacker within radio range to cause denial of service or potentially execute arbitrary code.
To fix CVE-2021-27803, users should update to wpa_supplicant version 2.10 or later.