Debian Wpa vulnerabilities
51 known vulnerabilities affecting debian/wpa.
Total CVEs
51
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH13MEDIUM30LOW8
Vulnerabilities
Page 2 of 3
CVE-2019-5062LOWCVSS 6.52019
CVE-2019-5062 [MEDIUM] CVE-2019-5062: wpa - An exploitable denial-of-service vulnerability exists in the 802.11w security st...
An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of service.
Scope: local
bookworm: open
bullseye: open
forky: open
sid: op
debian
CVE-2019-5061LOWCVSS 6.5fixed in wpa 2:2.9+git20200213+877d9a0-1 (bookworm)2019
CVE-2019-5061 [MEDIUM] CVE-2019-5061: wpa - An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where ...
An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clien
debian
CVE-2018-14526MEDIUMCVSS 6.5fixed in wpa 2:2.6-18 (bookworm)2018
CVE-2018-14526 [MEDIUM] CVE-2018-14526: wpa - An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Und...
An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
Scope: local
bookworm: resolved (fixed in 2:2.6-18)
bullseye: res
debian
CVE-2017-13082HIGHCVSS 8.1fixed in wpa 2:2.4-1.1 (bookworm)2017
CVE-2017-13082 [HIGH] CVE-2017-13082: wpa - Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstal...
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Scope: local
bookworm: resolved (fixed in 2:2.4-1.1)
bullseye: resolved (fixed in 2:2.4-1.1)
forky: resol
debian
CVE-2017-13079MEDIUMCVSS 5.3fixed in firmware-nonfree 20180825-1 (bookworm)2017
CVE-2017-13079 [MEDIUM] CVE-2017-13079: firmware-nonfree - Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstal...
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Scope: local
bookworm: resolved (fixed in 20180825-1)
bullseye: resolved (fixed in 20180825-1)
forky: resolve
debian
CVE-2017-13080MEDIUMCVSS 5.3fixed in firmware-nonfree 20180825-1 (bookworm)2017
CVE-2017-13080 [MEDIUM] CVE-2017-13080: firmware-nonfree - Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Tempora...
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
Scope: local
bookworm: resolved (fixed in 20180825-1)
bullseye: resolved (fixed in 20180825-1)
forky: resolved (fixed in 20180825-1)
sid: resolve
debian
CVE-2017-13086MEDIUMCVSS 6.8fixed in wpa 2:2.4-1.1 (bookworm)2017
CVE-2017-13086 [MEDIUM] CVE-2017-13086: wpa - Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Dire...
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Scope: local
bookworm: resolved (fixed in 2:2.4-1.1)
bullseye: resolved (fixed in 2:2.4-1.1)
forky: resolved (fixed in 2:2.4-1.1)
sid: resolved (fixed
debian
CVE-2017-13078MEDIUMCVSS 5.3fixed in firmware-nonfree 20180825-1 (bookworm)2017
CVE-2017-13078 [MEDIUM] CVE-2017-13078: firmware-nonfree - Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Tempora...
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
Scope: local
bookworm: resolved (fixed in 20180825-1)
bullseye: resolved (fixed in 20180825-1)
forky: resolved (fixed in 20180825-1)
sid: resolved
debian
CVE-2017-13077MEDIUMCVSS 6.8fixed in firmware-nonfree 20180825-1 (bookworm)2017
CVE-2017-13077 [MEDIUM] CVE-2017-13077: firmware-nonfree - Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Tran...
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Scope: local
bookworm: resolved (fixed in 20180825-1)
bullseye: resolved (fixed in 20180825-1)
forky: resolved (fixed in 20180825-1)
si
debian
CVE-2017-13081MEDIUMCVSS 5.3fixed in firmware-nonfree 20180825-1 (bookworm)2017
CVE-2017-13081 [MEDIUM] CVE-2017-13081: firmware-nonfree - Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstal...
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Scope: local
bookworm: resolved (fixed in 20180825-1)
bullseye: resolved (fixed in 20180825-1)
forky: resolv
debian
CVE-2017-13087MEDIUMCVSS 5.3fixed in wpa 2:2.4-1.1 (bookworm)2017
CVE-2017-13087 [MEDIUM] CVE-2017-13087: wpa - Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation...
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
Scope: local
bookworm: resolved (fixed in 2:2.4-1.1)
bullseye: resolved (fixed in 2:2.4-1.
debian
CVE-2017-13088MEDIUMCVSS 5.3fixed in wpa 2:2.4-1.1 (bookworm)2017
CVE-2017-13088 [MEDIUM] CVE-2017-13088: wpa - Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation...
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
Scope: local
bookworm: resolved (fixed in 2:2.4-1.1)
bullseye: resolved (fixed
debian
CVE-2017-13084LOWCVSS 6.82017
CVE-2017-13084 [MEDIUM] CVE-2017-13084: wpa - Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-St...
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Scope: local
bookworm: open
bullseye: open
forky: open
sid: open
trixie: open
debian
CVE-2016-4476HIGHCVSS 7.5fixed in wpa 2.3-2.4 (bookworm)2016
CVE-2016-4476 [HIGH] CVE-2016-4476: wpa - hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n ...
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
Scope: local
bookworm: resolved (fixed in 2.3-2.4)
bullseye: resolved (fixed in 2.3-2.4)
forky: resolved (fixed in 2.3-2.4)
sid: resolved (fixed i
debian
CVE-2016-4477HIGHCVSS 7.8fixed in wpa 2.3-2.4 (bookworm)2016
CVE-2016-4477 [HIGH] CVE-2016-4477: wpa - wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphr...
wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.
Scope: local
bookworm: resolved (fixed in 2.3-2.4)
bullseye: resolved (
debian
CVE-2016-10743LOWCVSS 7.5fixed in wpa 2:2.6-7 (bookworm)2016
CVE-2016-10743 [HIGH] CVE-2016-10743: wpa - hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached ...
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
Scope: local
bookworm: resolved (fixed in 2:2.6-7)
bullseye: resolved (fixed in 2:2.6-7)
forky: resolved (fixed in 2:2.6-7)
sid: resolved (fixed in 2:2.6-7)
trixie: resolved (fixed in 2:2.6-7)
debian
CVE-2015-5315MEDIUMCVSS 5.9fixed in wpa 2.3-2.3 (bookworm)2015
CVE-2015-5315 [MEDIUM] CVE-2015-5315: wpa - The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before ...
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
Scope: local
debian
CVE-2015-4144MEDIUMCVSS 5.0fixed in wpa 2.3-2.2 (bookworm)2015
CVE-2015-4144 [MEDIUM] CVE-2015-4144: wpa - The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 thr...
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.
Scope: local
bookworm: resolved (fixed in 2.3-2.2)
bullseye: resolved (fixed in 2.3-2.2)
forky: resolved (fixe
debian
CVE-2015-8041MEDIUMCVSS 5.0fixed in wpa 2.3-2.2 (bookworm)2015
CVE-2015-8041 [MEDIUM] CVE-2015-8041: wpa - Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and w...
Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value in an (1) WPS or (2) P2P NFC NDEF record, which triggers an out-of-bounds read.
Scope: local
bookworm: resolved (fixed in 2.3-2.2)
bullseye: re
debian
CVE-2015-5316MEDIUMCVSS 5.9fixed in wpa 2.3-2.3 (bookworm)2015
CVE-2015-5316 [MEDIUM] CVE-2015-5316: wpa - The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_suppl...
The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an EAP-pwd Confirm message followed by the Identity exchange.
Scope: local
bookworm: resolved (fixed in 2.3-2
debian