3.3
CVSSv2

CVE-2019-16275

Published: 12/09/2019 Updated: 07/11/2023
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 294
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

hostapd prior to 2.10 and wpa_supplicant prior to 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

w1.fi hostapd

w1.fi wpa supplicant

debian debian linux 8.0

debian debian linux 10.0

canonical ubuntu linux 16.04

canonical ubuntu linux 12.04

canonical ubuntu linux 18.04

canonical ubuntu linux 19.04

canonical ubuntu linux 14.04

Vendor Advisories

wpa_supplicant could be made to be disconnected and require reconnection to the network if it received a specially crafted management frame ...
wpa_supplicant could be made to be disconnected and require reconnection to the network if it received a specially crafted management frame ...
Two vulnerabilities were found in the WPA protocol implementation found in wpa_supplication (station) and hostapd (access point) CVE-2019-13377 A timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves could be used by an attacker to retrieve the password CVE-2019-16275 Insufficient source ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: hostapd/wpa_supplicant: AP mode PMF disconnection protection bypass <!--X-Subject-Header-End--> <!--X-Head-of-Message--> ...