vulnerability
Ubuntu: USN-7317-1 (CVE-2022-37660): wpa_supplicant and hostapd vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | Feb 11, 2025 | Mar 4, 2025 | Aug 18, 2025 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Feb 11, 2025
Added
Mar 4, 2025
Modified
Aug 18, 2025
Description
In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association.
Solutions
ubuntu-upgrade-hostapdubuntu-upgrade-wpasupplicant
References
- CVE-2022-37660
- https://attackerkb.com/topics/CVE-2022-37660
- CWE-323
- UBUNTU-USN-7317-1
- URL-https://link.springer.com/article/10.1007/s10207-025-00988-3
- URL-https://ubuntu.com/security/notices/USN-7317-1
- URL-https://w1.fi/cgit/hostap/commit/?id=15af83cf1846870873a011ed4d714732f01cd2e4
- URL-https://www.cve.org/CVERecord?id=CVE-2022-37660
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.