4.3
CVSSv2

CVE-2019-9494

Published: 17/04/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

w1.fi hostapd

w1.fi wpa supplicant

fedoraproject fedora 28

fedoraproject fedora 29

fedoraproject fedora 30

opensuse leap 15.1

opensuse backports sle 15.0

synology radius server 3.0

synology router manager

freebsd freebsd 11.2

freebsd freebsd 12.0

Vendor Advisories

Debian Bug report logs - #926958 freeradius: VU#871675: Authentication bypass in EAP-PWD (CVE-2019-11234 CVE-2019-11235) Package: src:freeradius; Maintainer for src:freeradius is Debian FreeRADIUS Packaging Team <pkg-freeradius-maintainers@listsaliothdebianorg>; Reported by: Bernhard Schmidt <berni@debianorg> Date ...
Debian Bug report logs - #926801 src:wpa: multiples vulnerabilities in SAE and EAP-pwd code in wpa Package: src:wpa; Maintainer for src:wpa is Debian wpasupplicant Maintainers <wpa@packagesdebianorg>; Reported by: Yves-Alexis Perez <corsac@debianorg> Date: Wed, 10 Apr 2019 15:54:01 UTC Severity: grave Tags: securi ...
Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found multiple vulnerabilities in the WPA implementation found in wpa_supplication (station) and hostapd (access point) These vulnerability are also collectively known as Dragonblood CVE-2019-9495 Cache-based side-channel attack against the EAP-pwd implementation: an ...

Recent Articles

Bug-hunters punch huge holes in WPA3 standard for Wi-Fi security
The Register • Shaun Nichols in San Francisco • 11 Apr 2019

Passwords, personal information can be sussed out by attackers during handshakes

Researchers have detailed a set of side-channel and downgrade attacks that potentially allow an attacker to compromise Wi-Fi networks equipped with WPA3 protections. Mathy Vanhoef, of New York University Abu Dhabi, and Eyal Ronen, of Tel Aviv University, have disclosed five different methods for breaking into or disrupting routers using the newest version of the wireless network security standard. The duo have already privately reporting the issue to the Wi-Fi Alliance and Cert/CC to make sure v...