An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of service.
The product does not properly verify that the source of data or communication is valid.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Hostapd | W1.fi | 2.6 (including) | 2.6 (including) |
Wpa | Ubuntu | bionic | * |
Wpa | Ubuntu | disco | * |
Wpa | Ubuntu | eoan | * |
Wpa | Ubuntu | groovy | * |
Wpa | Ubuntu | hirsute | * |
Wpa | Ubuntu | impish | * |
Wpa | Ubuntu | kinetic | * |
Wpa | Ubuntu | lunar | * |
Wpa | Ubuntu | mantic | * |
Wpa | Ubuntu | trusty | * |
Wpa | Ubuntu | trusty/esm | * |
Wpa | Ubuntu | xenial | * |