First published: Mon Jan 17 2022(Updated: )
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
W1.fi Hostapd | <2.10 | |
W1.fi Wpa Supplicant | <2.10 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23303 is a vulnerability in the implementations of SAE in hostapd and wpa_supplicant, which are used for Wi-Fi access point management and Wi-Fi client management, respectively.
CVE-2022-23303 has a severity rating of critical with a score of 9.8.
Versions before 2.10 of hostapd and wpa_supplicant are affected by CVE-2022-23303.
CVE-2022-23303 allows attackers to perform side channel attacks due to cache access patterns, potentially compromising the security of the Wi-Fi connections.
To fix CVE-2022-23303, upgrade to hostapd and wpa_supplicant versions 2.10 or above.