Vulnerabilities > W1 FI > WPA Supplicant

DATE CVE VULNERABILITY TITLE RISK
2024-08-07 CVE-2024-5290 Uncontrolled Search Path Element vulnerability in W1.Fi WPA Supplicant
An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
local
low complexity
w1-fi CWE-427
7.8
2024-02-22 CVE-2023-52160 Improper Authentication vulnerability in multiple products
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass.
network
low complexity
debian redhat fedoraproject w1-fi CWE-287
6.5
2022-01-17 CVE-2022-23303 Information Exposure Through Discrepancy vulnerability in multiple products
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns.
network
low complexity
w1-fi fedoraproject CWE-203
critical
9.8
2022-01-17 CVE-2022-23304 Information Exposure Through Discrepancy vulnerability in multiple products
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns.
network
low complexity
w1-fi fedoraproject CWE-203
critical
9.8
2021-04-02 CVE-2021-30004 Improper Input Validation vulnerability in W1.Fi Hostapd and WPA Supplicant
In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.
network
low complexity
w1-fi CWE-20
5.3
2021-02-26 CVE-2021-27803 A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests.
high complexity
w1-fi fedoraproject debian
7.5
2019-09-12 CVE-2019-16275 Origin Validation Error vulnerability in multiple products
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled.
low complexity
w1-fi debian canonical CWE-346
6.5
2019-04-26 CVE-2019-11555 NULL Pointer Dereference vulnerability in W1.Fi Hostapd and WPA Supplicant
The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received.
network
high complexity
w1-fi CWE-476
5.9
2019-04-17 CVE-2019-9499 Improper Authentication vulnerability in multiple products
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit.
8.1
2019-04-17 CVE-2019-9498 Improper Authentication vulnerability in multiple products
The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit.
8.1