The implementations of EAP-pwd in hostapd before 2.10 and...
Critical severity
Unreviewed
Published
Feb 15, 2022
to the GitHub Advisory Database
•
Updated Nov 3, 2025
Description
Published by the National Vulnerability Database
Jan 17, 2022
Published to the GitHub Advisory Database
Feb 15, 2022
Last updated
Nov 3, 2025
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
References