CVE Published: 17/04/2019 |
CVE Updated: 04/08/2024 |
CVE Year: 2019 Source: certcc |
Vendor: Wi-Fi Alliance |
Product: hostapd with SAE support Status : PUBLISHED
CVE-2019-9496 Description
An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.