CVE-2019-9495

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-9495
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-9495.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-9495
Downstream
Related
Published
2019-04-17T14:29:03Z
Modified
2025-08-09T19:01:27Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

The implementations of EAP-PWD in hostapd and wpasupplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpasupplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpasupplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpasupplicant with EAP-pwd support prior to and including version 2.7 are affected.

References

Affected packages