CVE-2018-14526
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/08/2018
Last modified:
03/10/2019
Description
An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
3.30
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:* | 2.0 (including) | 2.6 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00013.html
- http://www.securitytracker.com/id/1041438
- https://access.redhat.com/errata/RHSA-2018:3107
- https://cert-portal.siemens.com/productcert/pdf/ssa-344983.pdf
- https://lists.debian.org/debian-lts-announce/2018/08/msg00009.html
- https://papers.mathyvanhoef.com/woot2018.pdf
- https://security.FreeBSD.org/advisories/FreeBSD-SA-18:11.hostapd.asc
- https://usn.ubuntu.com/3745-1/
- https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
- https://www.us-cert.gov/ics/advisories/icsa-19-344-01