Description
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
References (9)
Scores
CVSS v3
5.9
EPSS
0.0145
EPSS Percentile
80.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-524
CWE-208
CWE-203
Status
published
Products (11)
fedoraproject/fedora
28
fedoraproject/fedora
29
fedoraproject/fedora
30
freebsd/freebsd
11.2 (10 CPE variants)
freebsd/freebsd
12.0 (4 CPE variants)
opensuse/backports_sle
15.0 (2 CPE variants)
opensuse/leap
15.1
synology/radius_server
3.0
synology/router_manager
< 1.2.3-8087
w1.fi/hostapd
< 2.7
... and 1 more
Published
Apr 17, 2019
Tracked Since
Feb 18, 2026