In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association.
History

Thu, 13 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-323
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Wed, 12 Feb 2025 13:30:00 +0000

Type Values Removed Values Added
Title hostapd: Public Key Exchange (PKEX) Reuse Vulnerability in hostapd
Weaknesses CWE-294
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}

threat_severity

Important


Tue, 11 Feb 2025 22:45:00 +0000

Type Values Removed Values Added
Description In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-13T14:18:19.149Z

Reserved: 2022-08-08T00:00:00.000Z

Link: CVE-2022-37660

cve-icon Vulnrichment

Updated: 2025-02-12T21:43:43.938Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-02-11T23:15:08.140

Modified: 2025-02-12T22:15:29.167

Link: CVE-2022-37660

cve-icon Redhat

Severity : Important

Publid Date: 2025-02-11T00:00:00Z

Links: CVE-2022-37660 - Bugzilla