Vulnerability CVE-2019-9496: Information

Description

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

Severity: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Published: April 17, 2019
Modified: Nov. 7, 2023
Error type identifier: CWE-287

Fixed packages

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*
      End including
      2.7

      cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*
      End including
      2.7

      Configuration 2

      cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*

      cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

      cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*