vulnerability
FreeBSD: VID-6BEDC863-9FBE-11E8-945F-206A8A720317 (CVE-2018-14526): wpa_supplicant -- unauthenticated encrypted EAPOL-Key data
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:A/AC:L/Au:N/C:P/I:N/A:N) | Aug 8, 2018 | Aug 15, 2018 | May 7, 2019 |
Severity
3
CVSS
(AV:A/AC:L/Au:N/C:P/I:N/A:N)
Published
Aug 8, 2018
Added
Aug 15, 2018
Modified
May 7, 2019
Description
An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
Solutions
freebsd-upgrade-base-10_4-release-p10freebsd-upgrade-base-11_2-release-p1freebsd-upgrade-package-wpa_supplicant
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.