{"id":"CVE-2019-9494","details":"The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.","modified":"2026-03-12T23:33:21.348492Z","published":"2019-04-17T14:29:03.840Z","related":["MGASA-2019-0229","SUSE-SU-2020:3380-1","SUSE-SU-2020:3424-1","SUSE-SU-2022:1853-1","openSUSE-SU-2020:0222-1","openSUSE-SU-2020:2053-1","openSUSE-SU-2020:2059-1","openSUSE-SU-2024:10846-1","openSUSE-SU-2024:11515-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56OBBOJJSKRTDGEXZOVFSTP4HDSDBLAE/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDOZGR3T7FVO5JSZWK2QPR7AOFIEJTIZ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVMJOFEYBGXZLFF5IOLW67SSOPKFEJP3/"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_19_16"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/May/40"},{"type":"ADVISORY","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:03.wpa.asc"},{"type":"FIX","url":"https://w1.fi/security/2019-1/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.7"}]},{"events":[{"introduced":"0"},{"last_affected":"2.7"}]},{"events":[{"introduced":"0"},{"last_affected":"28"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"3.0"}]},{"events":[{"introduced":"0"},{"fixed":"1.2.3-8087"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p2"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p3"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p4"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p5"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p6"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p7"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p8"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-p9"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-p1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-p2"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-p3"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-9494.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}