Metrics
Affected Vendors & Products
Fri, 24 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
W1.fi
W1.fi hostapd |
|
| CPEs | cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:* | |
| Vendors & Products |
W1.fi
W1.fi hostapd |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Mar 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | hostapd: RADIUS Packet Processing Flaw in hostapd | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 12 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Mar 2025 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail. | |
| Weaknesses | CWE-826 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published: 2025-03-12T04:43:54.870Z
Updated: 2025-03-12T13:21:59.254Z
Reserved: 2025-01-28T07:05:59.180Z
Link: CVE-2025-24912
Updated: 2025-03-12T13:21:56.027Z
Status : Analyzed
Published: 2025-03-12T05:15:37.430
Modified: 2025-10-24T18:40:03.117
Link: CVE-2025-24912