Vulnerability Description
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| W1.Fi | Hostapd | <= 2.4 |
| W1.Fi | Wpa Supplicant | <= 2.4 |
| Fedoraproject | Fedora | 28 |
| Opensuse | Backports Sle | 15.0 |
| Opensuse | Leap | 15.1 |
| Debian | Debian Linux | 8.0 |
| Synology | Radius Server | 3.0 |
| Synology | Router Manager | 1.2 |
| Freebsd | Freebsd | >= 11.0, <= 11.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/07/msg00030.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://seclists.org/bugtraq/2019/May/40Mailing ListThird Party Advisory
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:03.wpa.ascThird Party Advisory
- https://w1.fi/security/2019-4/PatchVendor Advisory
- https://www.synology.com/security/advisory/Synology_SA_19_16Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/07/msg00030.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://seclists.org/bugtraq/2019/May/40Mailing ListThird Party Advisory
FAQ
What is CVE-2019-9499?
CVE-2019-9499 is a vulnerability with a CVSS score of 8.1 (HIGH). The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pw...
How severe is CVE-2019-9499?
CVE-2019-9499 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9499?
Check the references section above for vendor advisories and patch information. Affected products include: W1.Fi Hostapd, W1.Fi Wpa Supplicant, Fedoraproject Fedora, Opensuse Backports Sle, Opensuse Leap.