Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4123-1 | wpa security update |
EUVD |
EUVD-2022-28389 | The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495. |
Ubuntu USN |
USN-7317-1 | wpa_supplicant and hostapd vulnerabilities |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T19:26:48.111Z
Reserved: 2022-01-17T00:00:00.000Z
Link: CVE-2022-23304
No data.
Status : Modified
Published: 2022-01-17T02:15:06.813
Modified: 2025-11-03T20:15:52.657
Link: CVE-2022-23304
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN