Skip to content

Commit

Permalink
6 changes (6 new | 0 updated):
Browse files Browse the repository at this point in the history
  • Loading branch information
cvelistV5 Github Action committed Feb 11, 2025
1 parent d66f219 commit 2b49e5b
Show file tree
Hide file tree
Showing 6 changed files with 688 additions and 0 deletions.
59 changes: 59 additions & 0 deletions cves/2022/37xxx/CVE-2022-37660.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
{
"dataType": "CVE_RECORD",
"cveMetadata": {
"state": "PUBLISHED",
"cveId": "CVE-2022-37660",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2025-02-11T22:25:35.931Z",
"dateReserved": "2022-08-08T00:00:00.000Z",
"datePublished": "2025-02-11T00:00:00.000Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-02-11T22:25:35.931Z"
},
"descriptions": [
{
"lang": "en",
"value": "In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association."
}
],
"affected": [
{
"vendor": "n/a",
"product": "n/a",
"versions": [
{
"version": "n/a",
"status": "affected"
}
]
}
],
"references": [
{
"url": "https://w1.fi/cgit/hostap/commit/?id=15af83cf1846870873a011ed4d714732f01cd2e4"
},
{
"url": "https://link.springer.com/article/10.1007/s10207-025-00988-3"
}
],
"problemTypes": [
{
"descriptions": [
{
"type": "text",
"lang": "en",
"description": "n/a"
}
]
}
]
}
},
"dataVersion": "5.1"
}
Loading

0 comments on commit 2b49e5b

Please sign in to comment.