ID CVE-2018-14526
Summary An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
References
Vulnerable Configurations
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:16.04:-:-:-:lts
  • cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
    cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • w1.fi WPA Supplicant 2.0
    cpe:2.3:a:w1.fi:wpa_supplicant:2.0
  • w1.fi WPA Supplicant 2.1
    cpe:2.3:a:w1.fi:wpa_supplicant:2.1
  • w1.fi WPA Supplicant 2.2
    cpe:2.3:a:w1.fi:wpa_supplicant:2.2
  • w1.fi WPA Supplicant 2.3
    cpe:2.3:a:w1.fi:wpa_supplicant:2.3
  • w1.fi WPA Supplicant 2.4
    cpe:2.3:a:w1.fi:wpa_supplicant:2.4
  • w1.fi WPA Supplicant 2.5
    cpe:2.3:a:w1.fi:wpa_supplicant:2.5
  • w1.fi WPA Supplicant 2.6
    cpe:2.3:a:w1.fi:wpa_supplicant:2.6
CVSS
Base: 3.3
Impact:
Exploitability:
CWE CWE-320
CAPEC
nessus via4
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1318.NASL
    description According to the version of the wpa_supplicant package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.(CVE-2018-14526) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-10-19
    modified 2018-10-18
    plugin id 117761
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117761
    title EulerOS 2.0 SP3 : wpa_supplicant (EulerOS-SA-2018-1318)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2018-C43C1EE06F.NASL
    description fix for CVE-2018-14526 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-10-19
    modified 2018-10-18
    plugin id 112101
    published 2018-08-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112101
    title Fedora 27 : 1:wpa_supplicant (2018-c43c1ee06f)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1462.NASL
    description The following vulnerability was discovered in wpa_supplicant. CVE-2018-14526: | An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 | through 2.6. Under certain conditions, the integrity of EAPOL-Key | messages is not checked, leading to a decryption oracle. An attacker | within range of the Access Point and client can abuse the | vulnerability to recover sensitive information. For Debian 8 'Jessie', this problem has been fixed in version 2.3-1+deb8u6. We recommend that you upgrade your wpa packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-10-19
    modified 2018-10-18
    plugin id 111618
    published 2018-08-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111618
    title Debian DLA-1462-1 : wpa security update
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1317.NASL
    description According to the version of the wpa_supplicant package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.(CVE-2018-14526) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-10-19
    modified 2018-10-18
    plugin id 117760
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117760
    title EulerOS 2.0 SP2 : wpa_supplicant (EulerOS-SA-2018-1317)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_6BEDC8639FBE11E8945F206A8A720317.NASL
    description SO-AND-SO reports : A vulnerability was found in how wpa_supplicant processes EAPOL-Key frames. It is possible for an attacker to modify the frame in a way that makes wpa_supplicant decrypt the Key Data field without requiring a valid MIC value in the frame, i.e., without the frame being authenticated. This has a potential issue in the case where WPA2/RSN style of EAPOL-Key construction is used with TKIP negotiated as the pairwise cipher. It should be noted that WPA2 is not supposed to be used with TKIP as the pairwise cipher. Instead, CCMP is expected to be used and with that pairwise cipher, this vulnerability is not applicable in practice. When TKIP is negotiated as the pairwise cipher, the EAPOL-Key Key Data field is encrypted using RC4. This vulnerability allows unauthenticated EAPOL-Key frames to be processed and due to the RC4 design, this makes it possible for an attacker to modify the plaintext version of the Key Data field with bitwise XOR operations without knowing the contents. This can be used to cause a denial of service attack by modifying GTK/IGTK on the station (without the attacker learning any of the keys) which would prevent the station from accepting received group-addressed frames. Furthermore, this might be abused by making wpa_supplicant act as a decryption oracle to try to recover some of the Key Data payload (GTK/IGTK) to get knowledge of the group encryption keys. Full recovery of the group encryption keys requires multiple attempts (128 connection attempts per octet) and each attempt results in disconnection due to a failure to complete the 4-way handshake. These failures can result in the AP/network getting disabled temporarily or even permanently (requiring user action to re-enable) which may make it impractical to perform the attack to recover the keys before the AP has already changes the group keys. By default, wpa_supplicant is enforcing at minimum a ten second wait time between each failed connection attempt, i.e., over 20 minutes waiting to recover each octet while hostapd AP implementation uses 10 minute default for GTK rekeying when using TKIP. With such timing behavior, practical attack would need large number of impacted stations to be trying to connect to the same AP to be able to recover sufficient information from the GTK to be able to determine the key before it gets changed.
    last seen 2018-10-18
    modified 2018-09-20
    plugin id 111720
    published 2018-08-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111720
    title FreeBSD : wpa_supplicant -- unauthenticated encrypted EAPOL-Key data (6bedc863-9fbe-11e8-945f-206a8a720317)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1293.NASL
    description hostapd was updated to fix following security issue : - CVE-2018-14526: Ignore unauthenticated encrypted EAPOL-Key data (bsc#1104205)
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 118481
    published 2018-10-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118481
    title openSUSE Security Update : hostapd (openSUSE-2018-1293)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-3107.NASL
    description An update for wpa_supplicant is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. Security Fix(es) : * wpa_supplicant: Unauthenticated EAPOL-Key decryption in wpa_supplicant (CVE-2018-14526) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.
    last seen 2018-11-01
    modified 2018-10-31
    plugin id 118529
    published 2018-10-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118529
    title RHEL 7 : wpa_supplicant (RHSA-2018:3107)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-3107.NASL
    description From Red Hat Security Advisory 2018:3107 : An update for wpa_supplicant is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. Security Fix(es) : * wpa_supplicant: Unauthenticated EAPOL-Key decryption in wpa_supplicant (CVE-2018-14526) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.
    last seen 2018-11-08
    modified 2018-11-07
    plugin id 118772
    published 2018-11-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118772
    title Oracle Linux 7 : wpa_supplicant (ELSA-2018-3107)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1316.NASL
    description This update for wpa_supplicant provides the following fixes : This security issues was fixe : - CVE-2018-14526: Under certain conditions, the integrity of EAPOL-Key messages was not checked, leading to a decryption oracle. An attacker within range of the Access Point and client could have abused the vulnerability to recover sensitive information (bsc#1104205) These non-security issues were fixed : - Fix reading private key passwords from the configuration file. (bsc#1099835) - Enable PWD as EAP method. This allows for password-based authentication, which is easier to setup than most of the other methods, and is used by the Eduroam network. (bsc#1109209) - compile eapol_test binary to allow testing via radius proxy and server (note: this does not match CONFIG_EAPOL_TEST which sets -Werror and activates an assert call inside the code of wpa_supplicant) (bsc#1111873), (fate#326725) - Enabled timestamps in log file when being invoked by systemd service file (bsc#1080798). - Fixes the default file permissions of the debug log file to more sane values, i.e. it is no longer world-readable (bsc#1098854). - Open the debug log file with O_CLOEXEC, which will prevent file descriptor leaking to child processes (bsc#1098854). This update was imported from the SUSE:SLE-15:Update update project.
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 118487
    published 2018-10-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118487
    title openSUSE Security Update : wpa_supplicant (openSUSE-2018-1316)
redhat via4
advisories
bugzilla
id 1614520
title CVE-2018-14526 wpa_supplicant: Unauthenticated EAPOL-Key decryption in wpa_supplicant
oval
AND
  • comment wpa_supplicant is earlier than 1:2.6-12.el7
    oval oval:com.redhat.rhsa:tst:20183107005
  • comment wpa_supplicant is signed with Red Hat redhatrelease2 key
    oval oval:com.redhat.rhsa:tst:20141956006
  • OR
    • comment Red Hat Enterprise Linux 7 Client is installed
      oval oval:com.redhat.rhsa:tst:20140675001
    • comment Red Hat Enterprise Linux 7 Server is installed
      oval oval:com.redhat.rhsa:tst:20140675002
    • comment Red Hat Enterprise Linux 7 Workstation is installed
      oval oval:com.redhat.rhsa:tst:20140675003
    • comment Red Hat Enterprise Linux 7 ComputeNode is installed
      oval oval:com.redhat.rhsa:tst:20140675004
rhsa
id RHSA-2018:3107
released 2018-10-30
severity Moderate
title RHSA-2018:3107: wpa_supplicant security and bug fix update (Moderate)
rpms wpa_supplicant-1:2.6-12.el7
refmap via4
freebsd FreeBSD-SA-18:11
misc
mlist [debian-lts-announce] 20180809 [SECURITY] [DLA 1462-1] wpa security update
sectrack 1041438
ubuntu USN-3745-1
Last major update 08-08-2018 - 15:29
Published 08-08-2018 - 15:29
Last modified 31-10-2018 - 06:31
Back to Top