CVE-2019-13377 PUBLISHED

The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.

EPSS 0.71% · 72.0th percentile

Risk Scores

EPSS Score
0.71%
72.0th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSwpa0, 2.4-0ubuntu10, 2:2.4-1.1ubuntu1

Timeline

References

Open in Interactive Console →