hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Mar 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | hostapd: RADIUS Packet Processing Flaw in hostapd | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 12 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 12 Mar 2025 05:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail. | |
Weaknesses | CWE-826 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-03-12T13:21:59.254Z
Reserved: 2025-01-28T07:05:59.180Z
Link: CVE-2025-24912

Updated: 2025-03-12T13:21:56.027Z

Status : Received
Published: 2025-03-12T05:15:37.430
Modified: 2025-03-12T05:15:37.430
Link: CVE-2025-24912
