7.9 High
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:M/Au:N/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
0.006 Low
EPSS
Percentile
78.2%
Severity: High
Date : 2021-02-12
CVE-ID : CVE-2021-0326
Package : wpa_supplicant
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1530
The package wpa_supplicant before version 2:2.9-8 is vulnerable to
arbitrary code execution.
Upgrade to 2:2.9-8.
The problem has been fixed upstream but no release is available yet.
The issue can be mitigated by disabling P2P, using the control
interface command “P2P_SET disabled 1” or “p2p_disabled=1” in (each, if
multiple interfaces used) wpa_supplicant configuration file.
A security issue was found in hostapd and wpa_supplicant version 2.9. A
missing length check in the p2p_copy_client_info function could lead to
a buffer overflow.
An attacker within radio range of the device running P2P discovery
might be able to cause a crash or execute arbitrary code.
https://bugs.archlinux.org/task/69525
https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27269
https://w1.fi/cgit/hostap/commit/?id=947272febe24a8f0ea828b5b2f35f13c3821901e
https://security.archlinux.org/CVE-2021-0326
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | wpa_supplicant | < 2:2.9-8 | UNKNOWN |
7.9 High
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:M/Au:N/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
0.006 Low
EPSS
Percentile
78.2%