
Cloud Vulnerability DB
A community-led vulnerabilities database
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. This vulnerability (CVE-2020-23303) exists because of an incomplete fix for CVE-2019-9494 (SUSE Linux).
The vulnerability stems from cache access patterns that can be exploited through side-channel attacks in the SAE (Simultaneous Authentication of Equals) implementation. This affects both hostapd and wpa_supplicant components in versions prior to 2.10 (SUSE Linux).
The vulnerability could allow attackers to perform side-channel attacks to potentially extract sensitive information from the cache access patterns during SAE authentication processes (SUSE Linux).
The issue has been fixed in hostapd and wpa_supplicant version 2.10. Users should upgrade to this version or later to address the vulnerability (SUSE Linux).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."