CVE Vulnerabilities

CVE-2022-37660

Reusing a Nonce, Key Pair in Encryption

Published: Feb 11, 2025 | Modified: Nov 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.4 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association.

Weakness

Nonces should be used for the present occasion and only once.

Affected Software

NameVendorStart VersionEnd Version
HostapdW1.fi*2.10 (including)
WpaUbuntudevel*
WpaUbuntuesm-infra/focal*
WpaUbuntufocal*
WpaUbuntujammy*
WpaUbuntunoble*
WpaUbuntuoracular*
WpaUbuntuupstream*

Potential Mitigations

References