wi-fi alliance Wpa Supplicant With Sae Support Vulnerabilities
Wi-fi%20alliance Wpa Supplicant With Sae Support vulnerabilities.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps
CVE-2019-9496Wi-fi AllianceHostapd With Sae Support7.5HIGHThe implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit
CVE-2019-9497Wi-fi AllianceHostapd With Eap-pwd S...EPSS 10%8.1HIGHThe implementations of EAP-PWD in hostapd EAP Server do not validate the scalar and element values in EAP-pwd-Commit
CVE-2019-9498Wi-fi AllianceHostapd With Eap-pwd S...8.1HIGHThe implementations of EAP-PWD in wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit
CVE-2019-9499Wi-fi AllianceHostapd With Eap-pwd S...8.1HIGHThe implementations of SAE in hostapd and wpa_supplicant are vulnerable to side-channel attacks
CVE-2019-9494Wi-fi AllianceHostapd With Sae Support5.9MEDIUM
17 April 2019
No more vulnerabilities to load.