
CVE-2023-52160 – wpa_supplicant: potential authorization bypass
https://notcve.org/view.php?id=CVE-2023-52160
22 Feb 2024 — The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks. La implementación de PEAP en wpa_supplicant hasta ... • https://github.com/Helica-core/eap_pwn • CWE-285: Improper Authorization CWE-287: Improper Authentication •

CVE-2022-23303 – Gentoo Linux Security Advisory 202309-16
https://notcve.org/view.php?id=CVE-2022-23303
17 Jan 2022 — The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494. Las implementaciones de SAE en hostapd versiones anteriores a 2.10 y wpa_supplicant versiones anteriores a 2.10, son vulnerables a ataques de canal lateral como resultado de los patrones de acceso a la caché. NOTA: este problema se presenta debido a una corrección incompleta de CVE... • https://github.com/skulkarni-mv/hostapd_mirror • CWE-203: Observable Discrepancy •

CVE-2022-23304 – Gentoo Linux Security Advisory 202309-16
https://notcve.org/view.php?id=CVE-2022-23304
17 Jan 2022 — The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495. Las implementaciones de EAP-pwd en hostapd versiones anteriores a 2.10 y wpa_supplicant versiones anteriores a 2.10, son vulnerables a ataques de canal lateral como resultado de los patrones de acceso a la caché. NOTA: este problema se presenta debido a una corrección incomplet... • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPDHU5MV464CZBPX7N2SNMUYP6DFIBZL • CWE-203: Observable Discrepancy •

CVE-2021-30004 – Gentoo Linux Security Advisory 202309-16
https://notcve.org/view.php?id=CVE-2021-30004
02 Apr 2021 — In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c. En wpa_supplicant y hostapd versión 2.9, los ataques de falsificación pueden ocurrir porque los parámetros AlgorithmIdentifier son manejados inapropiadamente en los archivos tls/pkcs1.c y tls/x509v3.c. Multiple vulnerabilities have been discovered in wpa_supplicant and hostapd, the worst of which could result in arbitrary code execution. Versions greater than or... • https://security.gentoo.org/glsa/202309-16 • CWE-20: Improper Input Validation •

CVE-2021-27803 – wpa_supplicant: Use-after-free in P2P provision discovery processing
https://notcve.org/view.php?id=CVE-2021-27803
26 Feb 2021 — A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. Se detectó una vulnerabilidad en la manera en que el archivo p2p/p2p_pd.c en wpa_supplicant versiones anteriores a 2.10, procesa unas peticiones de detección de aprovisionamiento P2P (Wi-Fi Direct). Podría resultar en una denegación de... • http://www.openwall.com/lists/oss-security/2021/02/27/1 • CWE-416: Use After Free •

CVE-2020-12695 – hostapd: UPnP SUBSCRIBE misbehavior in WPS AP
https://notcve.org/view.php?id=CVE-2020-12695
08 Jun 2020 — The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue. La especificación UPnP de Open Connectivity Foundation antes del 17-04-2020 no prohíbe la aceptación de una petición de suscripción con una URL de entrega en un segmento de red diferente a la URL de suscripción de evento totalmente calificada, también se co... • https://packetstorm.news/files/id/158051 • CWE-276: Incorrect Default Permissions CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2019-10064 – Hostapd Insufficient Entropy
https://notcve.org/view.php?id=CVE-2019-10064
28 Feb 2020 — hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743. hostapd versiones anteriores a 2.6, en el modo EAP, hace llamadas hacia las funciones de biblioteca estándar rand() y random() sin ninguna llamada srand() o srandom() precedente, lo que resulta en un uso inapropiado de valores determinísticos. Esto fue ... • http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html • CWE-331: Insufficient Entropy •

CVE-2019-5062
https://notcve.org/view.php?id=CVE-2019-5062
12 Dec 2019 — An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of service. Se presenta una vulnerabilidad de denegación de servicio explotable en el manejo del estado de seguridad 802.11w para clientes conectados a hostapd versión 2.6 con sesiones válidas de 802.11w. Simulando... • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0850 • CWE-346: Origin Validation Error CWE-440: Expected Behavior Violation •

CVE-2019-5061
https://notcve.org/view.php?id=CVE-2019-5061
12 Dec 2019 — An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger ... • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0849 • CWE-287: Improper Authentication CWE-440: Expected Behavior Violation •

CVE-2019-16275 – Ubuntu Security Notice USN-4136-1
https://notcve.org/view.php?id=CVE-2019-16275
12 Sep 2019 — hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. hostapd versiones anteriores a 2.10 y wpa_supplicant versiones anteriores a 2.10, permiten una indicación incorrecta de desconexión... • http://www.openwall.com/lists/oss-security/2019/09/12/6 • CWE-346: Origin Validation Error •