An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
The product establishes a communication channel with an endpoint and receives a message from that endpoint, but it does not sufficiently ensure that the message was not modified during transmission.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ubuntu_linux | Canonical | 14.04 (including) | 14.04 (including) |
Ubuntu_linux | Canonical | 16.04 (including) | 16.04 (including) |
Ubuntu_linux | Canonical | 18.04 (including) | 18.04 (including) |
Wpa | Ubuntu | bionic | * |
Wpa | Ubuntu | devel | * |
Wpa | Ubuntu | trusty | * |
Wpa | Ubuntu | xenial | * |
Red Hat Enterprise Linux 7 | RedHat | wpa_supplicant-1:2.6-12.el7 | * |