Lucene search

K
redhatcveRedhat.comRH:CVE-2019-9495
HistoryFeb 02, 2020 - 2:43 p.m.

CVE-2019-9495

2020-02-0214:43:12
redhat.com
access.redhat.com
11

0.008 Low

EPSS

Percentile

81.3%

A flaw was found in wpa_supplicant. Side channel attacks were recently discovered in the SAE implementations used by both hostapd and wpa_supplicant. EAP-pwd uses a similar design for deriving PWE from the password and while a specific attack against EAP-pwd is not yet known to be tested, there is no reason to believe that the EAP-pwd implementation would be immune against the type of cache attack that was identified for the SAE implementation. Since the EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP peer) does not support MODP groups, the timing attack described against SAE is not applicable for the EAP-pwd implementation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.