Vulnerability Description
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| W1.Fi | Hostapd | <= 2.7 |
| W1.Fi | Wpa Supplicant | <= 2.7 |
| Fedoraproject | Fedora | 28 |
| Opensuse | Backports Sle | 15.0 |
| Opensuse | Leap | 15.1 |
| Synology | Radius Server | 3.0 |
| Synology | Router Manager | < 1.2.3-8087 |
| Freebsd | Freebsd | 11.2 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.htmlMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SAThird Party AdvisoryVDB Entry
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://seclists.org/bugtraq/2019/May/40Mailing ListThird Party Advisory
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:03.wpa.ascThird Party Advisory
- https://w1.fi/security/2019-1/PatchVendor Advisory
- https://www.synology.com/security/advisory/Synology_SA_19_16Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.htmlMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SAThird Party AdvisoryVDB Entry
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://seclists.org/bugtraq/2019/May/40Mailing ListThird Party Advisory
FAQ
What is CVE-2019-9494?
CVE-2019-9494 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain ...
How severe is CVE-2019-9494?
CVE-2019-9494 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9494?
Check the references section above for vendor advisories and patch information. Affected products include: W1.Fi Hostapd, W1.Fi Wpa Supplicant, Fedoraproject Fedora, Opensuse Backports Sle, Opensuse Leap.