CVE-2015-5316 — NULL Pointer Dereference in WPA Supplicant
Severity
5.9MEDIUMNVD
EPSS
1.5%
top 18.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 21
Latest updateMay 14
Description
The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an EAP-pwd Confirm message followed by the Identity exchange.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6
Patches
🔴Vulnerability Details
4GHSA
▶
📋Vendor Advisories
3💬Community
1Bugzilla▶
CVE-2015-5316 wpa_supplicant: EAP-pwd peer error path failure on unexpected Confirm message↗2015-11-04