The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Apr 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_0
|
cvssV3_0
|

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-04T21:54:44.180Z
Reserved: 2019-03-01T00:00:00
Link: CVE-2019-9495

No data.

Status : Modified
Published: 2019-04-17T14:29:03.887
Modified: 2024-11-21T04:51:43.797
Link: CVE-2019-9495
