EAPOL-Key Message Integrity Issue in wpa_supplicant and Related Products
CVE-2018-14526
6.5MEDIUM
Summary
A vulnerability in wpa_supplicant versions 2.0 through 2.6 exists where under specific conditions, the integrity verification of EAPOL-Key messages is bypassed. This flaw allows an attacker within proximity of the Access Point and client to exploit the weak validation to create a decryption oracle, potentially recovering sensitive information transmitted over the network. Mitigation measures should be taken to secure systems against potential unauthorized access and data breaches.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved