CVE-2019-9495 vulnerability in W1fi and Other Products
Published on April 17, 2019
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns
Weakness Type
Use of Cache Containing Sensitive Information
The code uses a cache that contains sensitive information, but the cache can be read by an actor outside of the intended control sphere. Applications may use caches to improve efficiency when communicating with remote entities or performing intensive calculations. A cache maintains a pool of objects, threads, connections, pages, financial data, passwords, or other resources to minimize the time it takes to initialize and access these resources. If the cache is accessible to unauthorized actors, attackers can read the cache and obtain this sensitive information.
Products Associated with CVE-2019-9495
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2019-9495 are published in these products:
Affected Versions
Wi-Fi Alliance hostapd with EAP-pwd support:- Version 2.7, <= 2.7 is affected.
- Version 2.7, <= 2.7 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.