vulnerability
FreeBSD: VID-7e53f9cc-656d-11e9-8e67-206a8a720317 (CVE-2019-9494): FreeBSD -- SAE side-channel attacks
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Apr 23, 2019 | Apr 23, 2019 | Dec 10, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Apr 23, 2019
Added
Apr 23, 2019
Modified
Dec 10, 2025
Description
Problem Description: Side channel attacks in the SAE implementations used by both hostapd (AP) and wpa_supplicant (infrastructure BSS station/mesh station). SAE (Simultaneous Authentication of Equals) is also known as WPA3-Personal. The discovered side channel attacks may be able to leak information about the used password based on observable timing differences and cache access patterns. This might result in full password recovery when combined with an offline dictionary attack and if the password is not strong enough to protect against dictionary attacks. See https://w1.fi/security/2019-1/sae-side-channel-attacks.txt for a detailed description of the bug. Impact: All wpa_supplicant and hostapd versions with SAE support (CONFIG_SAE=y in the build configuration and SAE being enabled in the runtime configuration).
Solutions
freebsd-upgrade-base-12_0-release-p3freebsd-upgrade-base-11_2-release-p9freebsd-upgrade-package-wpa_supplicantfreebsd-upgrade-package-hostapd
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.