Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4123-1 | wpa security update |
EUVD |
EUVD-2022-28388 | The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494. |
Ubuntu USN |
USN-7317-1 | wpa_supplicant and hostapd vulnerabilities |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/o:redhat:enterprise_linux:9 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T19:26:46.732Z
Reserved: 2022-01-17T00:00:00.000Z
Link: CVE-2022-23303
No data.
Status : Modified
Published: 2022-01-17T02:15:06.760
Modified: 2025-11-03T20:15:52.523
Link: CVE-2022-23303
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN