CVE-2022-23304Improper Enforcement of Message Integrity During Transmission in a Communication Channel in Hostapd

Severity
9.8CRITICALNVD
CNA3.7OSV3.7
EPSS
0.1%
top 82.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 17
Latest updateMar 3

Description

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDw1.fi/hostapd< 2.10

Also affects: Fedora 35

Patches

🔴Vulnerability Details

4
OSV
wpa vulnerabilities2025-03-03
GHSA
GHSA-fwqr-qx2m-vqxq: The implementations of EAP-pwd in hostapd before 22022-02-15
OSV
CVE-2022-23304: The implementations of EAP-pwd in hostapd before 22022-01-17
CVEList
CVE-2022-23304: The implementations of EAP-pwd in hostapd before 22022-01-17

📋Vendor Advisories

4
Ubuntu
wpa_supplicant and hostapd vulnerabilities2025-03-03
Red Hat
wpa_supplicant: EAP-pwd side-channel attacks as a result of cache access patterns2022-01-17
Microsoft
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an 2022-01-11
Debian
CVE-2022-23304: wpa - The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before ...2022
CVE-2022-23304 — W1.fi Hostapd vulnerability | cvebase