CVE-2019-9499
HIGHwpa_supplicant <2.4 - RCE
Title source: llmDescription
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
References (9)
Scores
CVSS v3
8.1
EPSS
0.0121
EPSS Percentile
78.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-346
CWE-287
Status
published
Affected Products (26)
w1.fi/hostapd
< 2.4
w1.fi/wpa_supplicant
< 2.4
fedoraproject/fedora
fedoraproject/fedora
fedoraproject/fedora
opensuse/backports_sle
opensuse/backports_sle
opensuse/leap
debian/debian_linux
synology/radius_server
synology/router_manager
freebsd/freebsd
< 11.1
freebsd/freebsd
freebsd/freebsd
freebsd/freebsd
... and 11 more
Timeline
Published
Apr 17, 2019
Tracked Since
Feb 18, 2026