Description
The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4538-1 | wpa security update |
EUVD |
EUVD-2019-4874 | The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery. |
Ubuntu USN |
USN-4098-1 | wpa_supplicant and hostapd vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:49:24.914Z
Reserved: 2019-07-07T00:00:00.000Z
Link: CVE-2019-13377
No data.
Status : Modified
Published: 2019-08-15T17:15:13.410
Modified: 2024-11-21T04:24:49.237
Link: CVE-2019-13377
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN