vulnerability
FreeBSD: VID-45671c0e-a652-11e8-805b-a4badb2f4699 (CVE-2018-1452): FreeBSD -- Unauthenticated EAPOL-Key Decryption Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:L/Au:N/C:N/I:P/A:P) | Aug 22, 2018 | Aug 23, 2018 | Dec 10, 2025 |
Severity
4
CVSS
(AV:L/AC:L/Au:N/C:N/I:P/A:P)
Published
Aug 22, 2018
Added
Aug 23, 2018
Modified
Dec 10, 2025
Description
Problem Description: When using WPA2, EAPOL-Key frames with the Encrypted flag and without the MIC flag set, the data field was decrypted first without verifying the MIC. When the dta field was encrypted using RC4, for example, when negotiating TKIP as a pairwise cipher, the unauthenticated but decrypted data was subsequently processed. This opened wpa_supplicant(8) to abuse by decryption and recovery of sensitive information contained in EAPOL-Key messages. See https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt for a detailed description of the bug. Impact: All users of the WPA2 TKIP pairwise cipher are vulnerable to information, for example, the group key.
Solutions
freebsd-upgrade-base-11_2-release-p2freebsd-upgrade-base-11_1-release-p13freebsd-upgrade-base-10_4-release-p11
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.