EAPOL-Key Message Integrity Issue in wpa_supplicant and Related Products
CVE-2018-14526

6.5MEDIUM

Key Information:

Vendor
Canonical
Vendor
CVE Published:
8 August 2018

Summary

A vulnerability in wpa_supplicant versions 2.0 through 2.6 exists where under specific conditions, the integrity verification of EAPOL-Key messages is bypassed. This flaw allows an attacker within proximity of the Access Point and client to exploit the weak validation to create a decryption oracle, potentially recovering sensitive information transmitted over the network. Mitigation measures should be taken to secure systems against potential unauthorized access and data breaches.

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.