CVE-2019-9498

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

References

http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html

https://lists.debian.org/debian-lts-announce/2019/07/msg00030.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/56OBBOJJSKRTDGEXZOVFSTP4HDSDBLAE/

https://lists.fedoraproject.org/archives/list/[email protected]/message/SVMJOFEYBGXZLFF5IOLW67SSOPKFEJP3/

https://lists.fedoraproject.org/archives/list/[email protected]/message/TDOZGR3T7FVO5JSZWK2QPR7AOFIEJTIZ/

https://seclists.org/bugtraq/2019/May/40

https://security.FreeBSD.org/advisories/FreeBSD-SA-19:03.wpa.asc

https://w1.fi/security/2019-4/

https://www.synology.com/security/advisory/Synology_SA_19_16

Details

Source: MITRE

Published: 2019-04-17

Updated: 2020-10-22

Type: CWE-287

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 8.1

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.2

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:* versions up to 2.4 (inclusive)

cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:* versions from 2.5 to 2.7 (inclusive)

cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:* versions up to 2.4 (inclusive)

cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:* versions from 2.5 to 2.7 (inclusive)

Configuration 2

OR

cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*

cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:synology:radius_server:3.0:*:*:*:*:*:*:*

cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* versions from 11.0 to 11.1 (inclusive)

cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11.2:p13:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11.2:p2:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11.2:p3:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11.2:p6:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11.2:p7:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11.2:p8:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:11.2:p9:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
143704SUSE SLES12 Security Update : wpa_supplicant (SUSE-SU-2020:3424-1) (KRACK)NessusSuSE Local Security Checks
high
143627SUSE SLED15 / SLES15 Security Update : wpa_supplicant (SUSE-SU-2020:3380-1) (KRACK)NessusSuSE Local Security Checks
high
143321openSUSE Security Update : wpa_supplicant (openSUSE-2020-2053) (KRACK)NessusSuSE Local Security Checks
high
143304openSUSE Security Update : wpa_supplicant (openSUSE-2020-2059) (KRACK)NessusSuSE Local Security Checks
high
133758openSUSE Security Update : hostapd (openSUSE-2020-222) (KRACK)NessusSuSE Local Security Checks
high
132827EulerOS Virtualization for ARM 64 3.0.5.0 : wpa_supplicant (EulerOS-SA-2020-1073)NessusHuawei Local Security Checks
high
132629EulerOS 2.0 SP8 : wpa_supplicant (EulerOS-SA-2020-1036)NessusHuawei Local Security Checks
high
127476Debian DLA-1867-1 : wpa security updateNessusDebian Local Security Checks
high
124554Fedora 30 : hostapd (2019-eba1109acd)NessusFedora Local Security Checks
high
124539Fedora 30 : 1:wpa_supplicant (2019-ca49dfd42f)NessusFedora Local Security Checks
high
124252Fedora 29 : hostapd (2019-f409af9fbe)NessusFedora Local Security Checks
high
124250Fedora 28 : hostapd (2019-d03bae77f5)NessusFedora Local Security Checks
high
124219FreeBSD : FreeBSD -- EAP-pwd missing commit validation (2da3cb25-6571-11e9-8e67-206a8a720317)NessusFreeBSD Local Security Checks
high
124038Debian DSA-4430-1 : wpa - security updateNessusDebian Local Security Checks
high
123999Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 18.10 : wpa_supplicant and hostapd vulnerabilities (USN-3944-1)NessusUbuntu Local Security Checks
high