MEDIUM · 5.9

CVE-2019-9494

The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain ...

Vulnerability Description

The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

CVSS Score

5.9

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
W1.FiHostapd<= 2.7
W1.FiWpa Supplicant<= 2.7
FedoraprojectFedora28
OpensuseBackports Sle15.0
OpensuseLeap15.1
SynologyRadius Server3.0
SynologyRouter Manager< 1.2.3-8087
FreebsdFreebsd11.2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-9494?

CVE-2019-9494 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain ...

How severe is CVE-2019-9494?

CVE-2019-9494 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-9494?

Check the references section above for vendor advisories and patch information. Affected products include: W1.Fi Hostapd, W1.Fi Wpa Supplicant, Fedoraproject Fedora, Opensuse Backports Sle, Opensuse Leap.