4.3
CVSSv2

CVE-2019-9495

Published: 17/04/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.7 | Impact Score: 1.4 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

It exists that wpa_supplicant and hostapd were vulnerable to a side channel attack against EAP-pwd. A remote attacker could possibly use this issue to recover certain passwords. (CVE-2019-9495)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

w1.fi hostapd

w1.fi wpa supplicant

fedoraproject fedora 28

fedoraproject fedora 29

fedoraproject fedora 30

opensuse leap 15.1

opensuse backports sle 15.0

debian debian linux 8.0

synology radius server 3.0

synology router manager

freebsd freebsd 11.2

freebsd freebsd 12.0

Vendor Advisories

Several security issues were fixed in wpa_supplicant and hostapd ...
Debian Bug report logs - #926958 freeradius: VU#871675: Authentication bypass in EAP-PWD (CVE-2019-11234 CVE-2019-11235) Package: src:freeradius; Maintainer for src:freeradius is Debian FreeRADIUS Packaging Team <pkg-freeradius-maintainers@listsaliothdebianorg>; Reported by: Bernhard Schmidt <berni@debianorg> Date ...
Debian Bug report logs - #926801 src:wpa: multiples vulnerabilities in SAE and EAP-pwd code in wpa Package: src:wpa; Maintainer for src:wpa is Debian wpasupplicant Maintainers <wpa@packagesdebianorg>; Reported by: Yves-Alexis Perez <corsac@debianorg> Date: Wed, 10 Apr 2019 15:54:01 UTC Severity: grave Tags: securi ...
Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found multiple vulnerabilities in the WPA implementation found in wpa_supplication (station) and hostapd (access point) These vulnerability are also collectively known as Dragonblood CVE-2019-9495 Cache-based side-channel attack against the EAP-pwd implementation: an ...