{"id":"CVE-2019-13377","details":"The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.","modified":"2026-03-12T23:00:02.319171Z","published":"2019-08-15T17:15:13.410Z","related":["MGASA-2019-0229","SUSE-SU-2020:3380-1","SUSE-SU-2020:3424-1","SUSE-SU-2022:1853-1","openSUSE-SU-2020:2053-1","openSUSE-SU-2020:2059-1","openSUSE-SU-2024:11515-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IELLEPIXWQOJFW4SZMU3WQHO63JFAHA4/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4538"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Sep/56"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4098-1/"},{"type":"FIX","url":"https://w1.fi/cgit/hostap/commit/?id=147bf7b88a9c231322b5b574263071ca6dbb0503"},{"type":"FIX","url":"https://w1.fi/cgit/hostap/commit/?id=cd803299ca485eb857e37c88f973fccfbb8600e5"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"2.0"},{"last_affected":"2.8"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13377.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}