First published: Tue Aug 06 2019(Updated: )
A flaw was found in the implementation of EAP-pwd in FreeRADIUS. An attacker could initiate several EAP-pwd handshakes to leak information, which can then be used to recover the user's WiFi password by performing dictionary and brute-force attacks. References: <a href="https://wpa3.mathyvanhoef.com/#new">https://wpa3.mathyvanhoef.com/#new</a>
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRADIUS FreeRADIUS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1737663 is considered significant due to the potential for leakage of sensitive user information.
To fix REDHAT-BUG-1737663, ensure that you update to the latest version of FreeRADIUS that includes security patches addressing this vulnerability.
REDHAT-BUG-1737663 is caused by a flaw in the implementation of EAP-pwd in the FreeRADIUS software, allowing attackers to initiate multiple handshakes.
Users of FreeRADIUS who utilize EAP-pwd for authentication may be affected by REDHAT-BUG-1737663.
The potential consequences of REDHAT-BUG-1737663 include unauthorized recovery of WiFi passwords through information leakage and subsequent brute-force attacks.