The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
2022-01-17T02:15:06.813
2024-11-21T06:48:22.370
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | w1.fi | hostapd | < 2.10 | Yes |
Application | w1.fi | wpa_supplicant | < 2.10 | Yes |
Operating System | fedoraproject | fedora | 35 | Yes |