First published: Mon Jan 17 2022(Updated: )
Last updated 4 March 2025
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | <=2:2.9.0-21+deb11u2 | 2:2.10-12+deb12u2 2:2.10-22 |
hostapd | <2.10 | |
wpa_supplicant | <2.10 | |
Red Hat Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23303 is a vulnerability in the implementations of SAE in hostapd and wpa_supplicant, which are used for Wi-Fi access point management and Wi-Fi client management, respectively.
CVE-2022-23303 has a severity rating of critical with a score of 9.8.
Versions before 2.10 of hostapd and wpa_supplicant are affected by CVE-2022-23303.
CVE-2022-23303 allows attackers to perform side channel attacks due to cache access patterns, potentially compromising the security of the Wi-Fi connections.
To fix CVE-2022-23303, upgrade to hostapd and wpa_supplicant versions 2.10 or above.