First published: Wed Mar 12 2025(Updated: )
hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
w1.fi hostapd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24912 is considered a high-severity vulnerability due to its potential to enable denial-of-service conditions in RADIUS authentication.
CVE-2025-24912 affects hostapd by allowing an attacker to inject crafted RADIUS packets, causing authentication to fail.
To fix CVE-2025-24912, update hostapd to the latest version that contains patches for this vulnerability.
CVE-2025-24912 enables a man-in-the-middle attack where an attacker can disrupt RADIUS authentications.
All versions of hostapd that process RADIUS packets are potentially affected by CVE-2025-24912.