{"id":"UBUNTU-CVE-2018-14526","details":"An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.","modified":"2026-01-30T01:53:48.736879Z","published":"2018-08-08T00:00:00Z","related":["USN-3745-1"],"upstream":["CVE-2018-14526"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14526"},{"type":"REPORT","url":"https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt"},{"type":"REPORT","url":"https://w1.fi/security/2018-1/0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch"},{"type":"REPORT","url":"https://w1.fi/security/2018-1/rebased-v2.6-0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch"},{"type":"REPORT","url":"https://papers.mathyvanhoef.com/woot2018.pdf"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3745-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-14526"}],"affected":[{"package":{"name":"wpa","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/wpa@2.1-0ubuntu1.6?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1-0ubuntu1.6"}]}],"versions":["1.0-3ubuntu2","1.0-3ubuntu3","1.0-3ubuntu4","2.1-0ubuntu1","2.1-0ubuntu1.1","2.1-0ubuntu1.2","2.1-0ubuntu1.3","2.1-0ubuntu1.4","2.1-0ubuntu1.5"],"ecosystem_specific":{"binaries":[{"binary_name":"hostapd","binary_version":"1:2.1-0ubuntu1.6"},{"binary_name":"wpagui","binary_version":"2.1-0ubuntu1.6"},{"binary_name":"wpasupplicant","binary_version":"2.1-0ubuntu1.6"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14526.json"}},{"package":{"name":"wpa","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/wpa@2.4-0ubuntu6.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4-0ubuntu6.3"}]}],"versions":["2.4-0ubuntu3","2.4-0ubuntu4","2.4-0ubuntu5","2.4-0ubuntu6","2.4-0ubuntu6.2"],"ecosystem_specific":{"binaries":[{"binary_name":"hostapd","binary_version":"1:2.4-0ubuntu6.3"},{"binary_name":"wpagui","binary_version":"2.4-0ubuntu6.3"},{"binary_name":"wpasupplicant","binary_version":"2.4-0ubuntu6.3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14526.json"}},{"package":{"name":"wpa","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/wpa@2:2.6-15ubuntu2.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.6-15ubuntu2.1"}]}],"versions":["2.4-0ubuntu10","2:2.4-1.1ubuntu1","2:2.6-15ubuntu1","2:2.6-15ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_name":"hostapd","binary_version":"2:2.6-15ubuntu2.1"},{"binary_name":"wpagui","binary_version":"2:2.6-15ubuntu2.1"},{"binary_name":"wpasupplicant","binary_version":"2:2.6-15ubuntu2.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14526.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}