{"id":"CVE-2019-9499","details":"The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.","modified":"2026-03-15T22:32:11.306881Z","published":"2019-04-17T14:29:04.057Z","related":["SUSE-SU-2020:3380-1","SUSE-SU-2020:3424-1","SUSE-SU-2022:1853-1","openSUSE-SU-2020:0222-1","openSUSE-SU-2020:2053-1","openSUSE-SU-2020:2059-1","openSUSE-SU-2024:10846-1","openSUSE-SU-2024:11515-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56OBBOJJSKRTDGEXZOVFSTP4HDSDBLAE/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVMJOFEYBGXZLFF5IOLW67SSOPKFEJP3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDOZGR3T7FVO5JSZWK2QPR7AOFIEJTIZ/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/May/40"},{"type":"ADVISORY","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:03.wpa.asc"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_19_16"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/07/msg00030.html"},{"type":"FIX","url":"https://w1.fi/security/2019-4/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.4"}]},{"events":[{"introduced":"2.5"},{"last_affected":"2.7"}]},{"events":[{"introduced":"0"},{"last_affected":"2.4"}]},{"events":[{"introduced":"2.5"},{"last_affected":"2.7"}]},{"events":[{"introduced":"0"},{"last_affected":"28"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.2"}]},{"events":[{"introduced":"11.0"},{"last_affected":"11.1"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p13"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p2"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p3"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p4"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p5"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p6"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p7"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p8"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p9"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-p1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-p2"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-p3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-9499.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}