CVE-2019-16275

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

References

http://www.openwall.com/lists/oss-security/2019/09/12/6

https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/36G4XAZ644DMHBLKOL4FDSPZVIGNQY6U/

https://lists.fedoraproject.org/archives/list/[email protected]/message/B7NCLOPTZNRRNYODH22BFIDH6YIQWLJD/

https://lists.fedoraproject.org/archives/list/[email protected]/message/FEGITWRTIWABW54ANEPCEF4ARZLXGSK5/

https://lists.fedoraproject.org/archives/list/[email protected]/message/HY6STGJIIROVNIU6VMB2WTN2Q5M65WF4/

https://lists.fedoraproject.org/archives/list/[email protected]/message/PBJXUKV6XMSELWNXPS37CSUIH5EUHFXQ/

https://seclists.org/bugtraq/2019/Sep/56

https://usn.ubuntu.com/4136-1/

https://usn.ubuntu.com/4136-2/

https://w1.fi/security/2019-7/

https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt

https://www.debian.org/security/2019/dsa-4538

https://www.openwall.com/lists/oss-security/2019/09/11/7

Details

Source: MITRE

Published: 2019-09-12

Updated: 2020-08-24

Type: CWE-346

Risk Information

CVSS v2

Base Score: 3.3

Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 6.5

Severity: LOW

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 2.8

Severity: MEDIUM

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
148411openSUSE Security Update : hostapd (openSUSE-2021-519)NessusSuSE Local Security Checks
high
146523SUSE SLES12 Security Update : wpa_supplicant (SUSE-SU-2021:0478-1)NessusSuSE Local Security Checks
high
143704SUSE SLES12 Security Update : wpa_supplicant (SUSE-SU-2020:3424-1) (KRACK)NessusSuSE Local Security Checks
high
143627SUSE SLED15 / SLES15 Security Update : wpa_supplicant (SUSE-SU-2020:3380-1) (KRACK)NessusSuSE Local Security Checks
high
143321openSUSE Security Update : wpa_supplicant (openSUSE-2020-2053) (KRACK)NessusSuSE Local Security Checks
high
143304openSUSE Security Update : wpa_supplicant (openSUSE-2020-2059) (KRACK)NessusSuSE Local Security Checks
high
140911EulerOS 2.0 SP3 : wpa_supplicant (EulerOS-SA-2020-2144)NessusHuawei Local Security Checks
medium
132827EulerOS Virtualization for ARM 64 3.0.5.0 : wpa_supplicant (EulerOS-SA-2020-1073)NessusHuawei Local Security Checks
high
131372EulerOS 2.0 SP8 : wpa_supplicant (EulerOS-SA-2019-2306)NessusHuawei Local Security Checks
medium
131090Fedora 30 : 1:wpa_supplicant (2019-2bdcccee3c)NessusFedora Local Security Checks
medium
131039Fedora 29 : 1:wpa_supplicant (2019-65509aac53)NessusFedora Local Security Checks
medium
130788Fedora 31 : hostapd (2019-740834c559)NessusFedora Local Security Checks
medium
130781Fedora 30 : hostapd (2019-2265b5ae86)NessusFedora Local Security Checks
medium
130613Fedora 31 : 1:wpa_supplicant (2019-0e0b28001d)NessusFedora Local Security Checks
medium
129416Debian DSA-4538-1 : wpa - security updateNessusDebian Local Security Checks
medium
129050Ubuntu 16.04 LTS / 18.04 LTS / 19.04 : wpa_supplicant and hostapd vulnerability (USN-4136-1)NessusUbuntu Local Security Checks
medium
128880Debian DLA-1922-1 : wpa security updateNessusDebian Local Security Checks
medium