CVE-2019-9498

Impact:
Important
Public Date:
2019-04-10
CWE:
CWE-345
Bugzilla:
1699168: CVE-2019-9498 wpa_supplicant: EAP-pwd server missing commit validation for scalar/element

The MITRE CVE dictionary describes this issue as:

The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

Find out more about CVE-2019-9498 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 5, 6 as they did not include support for EAP-pwd.

This issue did not affect the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 7 as they are not compiled with EAP-pwd enabled. In particular, the CONFIG_EAP_PWD=y option is not set at compile time.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 6.8
CVSS3 Base Metrics CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector Adjacent Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact None

Affected Packages State

Platform Package State
Red Hat Virtualization 4 rhvm-appliance Not affected
Red Hat Virtualization 4 redhat-virtualization-host Not affected
Red Hat Enterprise Linux 8 wpa_supplicant Not affected
Red Hat Enterprise Linux 7 wpa_supplicant Not affected
Red Hat Enterprise Linux 6 wpa_supplicant Not affected
Red Hat Enterprise Linux 5 wpa_supplicant Not affected

Acknowledgements

Red Hat would like to thank Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) for reporting this issue.

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation