First published: Tue Aug 06 2019(Updated: )
A flaw was found in the implementation of EAP-pwd in FreeRADIUS. An attacker could initiate several EAP-pwd handshakes to leak information, which can then be used to recover the user's WiFi password by performing dictionary and brute-force attacks. References: <a href="https://wpa3.mathyvanhoef.com/#new">https://wpa3.mathyvanhoef.com/#new</a>
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRADIUS FreeRADIUS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.