This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor w1.Fi First view 2019-09-12
Product Wpa Supplicant Last view 2021-04-02
Version 2.9 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:w1.fi:wpa_supplicant

Activity : Overall

Related : CVE

  Date Alert Description
5.3 2021-04-02 CVE-2021-30004

In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.

7.5 2021-02-26 CVE-2021-27803

A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.

6.5 2019-09-12 CVE-2019-16275

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

CWE : Common Weakness Enumeration

%idName
50% (1) CWE-346 Origin Validation Error
50% (1) CWE-20 Improper Input Validation