CVE-2019-9499

HIGH

wpa_supplicant <2.4 - RCE

Title source: llm

Description

The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

Scores

CVSS v3 8.1
EPSS 0.0121
EPSS Percentile 78.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-346 CWE-287
Status published

Affected Products (26)

w1.fi/hostapd < 2.4
w1.fi/wpa_supplicant < 2.4
fedoraproject/fedora
fedoraproject/fedora
fedoraproject/fedora
opensuse/backports_sle
opensuse/backports_sle
opensuse/leap
debian/debian_linux
synology/radius_server
synology/router_manager
freebsd/freebsd < 11.1
freebsd/freebsd
freebsd/freebsd
freebsd/freebsd
... and 11 more

Timeline

Published Apr 17, 2019
Tracked Since Feb 18, 2026